Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Security » Interviews »

  • COPE Offers IT and Workers an Alternative to BYOD

    Smartphones aren't cheap, but they've become our window to the world. We use them to run our lives, stay plugged in and even get some work done. We can't live without 'em. And so we dig into our pockets every month to pay a huge phone bill despite our shoestring budget.

  • Palo Alto says its new endpoint protection tool can stop the bad stuff in its tracks

    The problem with signature based security tools is you are vulnerable until the signature is released and distributed. Palo Alto Networks takes a different approach with Traps, so Network World Editor in Chief John Dix tracked down Palo Alto VP of Product Marketing Scott Gainey for an inside look at how Traps works.

  • You are responsible for your own Internet privacy

    Bill Clinton's run for presidency nearly derailed when rumors surfaced that he had smoked marijuana during his time in England. In an effort to control the damage, Clinton admitted that he indeed experimented with the illegal drug but "didn't inhale." Imagine how history might have changed if a video of a glassy-eyed Clinton with a joint between his lips had shown up on Youtube (which, of course, didn't exist at the time).

  • Inside the Changing Role of the CISO

    With a number of high-profile security breaches making headlines of late, organizations are increasingly realizing they must beef up their security teams or risk catastrophe. Matt Comyns, global co-head of the Cybersecurity practice at Russell Reynolds Associates, an executive leadership and search firm, sat down with CIO.com to discuss the changing role of the Chief Information Security Officer (CISO), the global cybersecurity landscape and why finding and retaining elite security talent is critical.

  • Early user of VMware NSX net virtualization tool extols fine grain controls

    Canadian airline company WestJet is one of the earliest customers of VMware's NSX network virtualization tools, which initially reached for the tech to address a security issue. Network World Editor in Chief John Dix recently sat down with WestJet technologist Richard Sillito to learn what the company is learning about network virtualization and its broader NSX plans.

  • Securing the virtual world

    Catbird Networks Director of Product Management, Malcolm Reike, talks about how virtualization changes the security game with Network World Editor in Chief John Dix.

  • Cloud provider FireHost's security chief brings lessons from the front lines

    Jeff Schilling, who joined cloud hosting startup FireHost this week as chief security officer, knows a thing or two about cybersecurity.

  • CIOs must adapt or risk being replaced

    Michael Keithley has more than two decades of experience as a CIO. However, the IT veteran says he's seeing more change now than ever before. CIO.com's Tom Kaneshige sat down with Keithley to talk about the challenges he and his colleagues face, the need to speak the same language as the business side and the reality of what lies ahead for CIOs who refuse to change their approach.

  • Cybersecurity Expert and CIO: Internet of Things is 'Scary as Hell'

    The terms "Internet of Things" (IoT) and "connected home" are two of the trendiest buzzwords in the technology world today. And while both clearly offer very real potential, they also introduce their own share of risk, particularly if they're not approached with caution, according to Jerry Irvine, an owner and CIO of IT outsourcing services firm, Prescient Solutions.

  • Ethics Code Seeks to Deter Dishonest Analytics

    The INFORMS code of ethics requires analytics professionals to report unbiased answers, not just what the client wants to hear.

  • What Does iOS 7 Bring to the BYOD Party?

    Apple's first rule about enterprise features: 'You don't talk about enterprise features.' While you may not hear it from Cupertino, BYOD features abound in iOS 7 and, according to AirWatch's Blake Brannon, they are 'as innovative as we've seen from Apple.'

  • Good Technology CEO: 'We focus on the data, not the device'

    Good Technology has become one the leaders in mobile management, amassing more than 4,000 customers, including many in government and highly regulated industries.

  • Cloud computing causing rethinking of disaster recovery

    Cloud computing gives organisations the opportunity to rethink many traditional IT practices, but it may be a particularly good fit for disaster recovery and business continuity.

  • Will BYOD Give Rise to the Enterprise Genius Bar?

    As the evasion of consumer tech changes IT, it makes sense that support for consumer devices would start to reflect the retail experience. Think Apples Genius Bar. Mike Burgio of Inergex, an IT services firm, talks about why IT leaders need to think about hitting the bar.

  • The BYOD Mobile Security Threat Is Real

    Cloud storage, text messaging, poor accountability and the "Bad Leaver" open the doors to data breaches in a BYOD environment, says a cyber-crime expert in this CIO.com interview.

  • Energy Company's IT and Business Units Share Responsibility

    At Energy Future Holdings, CEO John Young emphasizes the human factors behind IT, supports standardization and expects the CIO to work with business partners.

  • Killing the Help Desk Softly - or Blowing It Up

    A "bring your own support" movement is sprouting up within BYOD programs as employees become more self-sufficient. Is this a death knell for the IT help desk? One possible savior: an enterprise Genius Bar.

  • Apple Expert Details How to Keep iPad Enterprise Migrations in Check

    There's no easy path to iPad adoption and a bogged-down iPad pilot program can spell disaster. Apple could be more helpful to businesses, but there are ways to simplify complicated iPad migrations. Here's what a tech services firm learned while helping Cablevision configure 3,000 iPads.

  • Dell Software CIO says BYOD is not about devices

    For Dell Software CIO Carol Fawcett, "BYOD" is not about being an expert on every mobile device in the world; it's about giving workers secure access to the apps and data they need on whatever device they are using.

  • CIOs Talk About How Social Networking Builds Enterprise Collaboration

    Over the last five years or so, more organizations have used social networking sites such as Facebook and Twitter to communicate with customers. Now many organizations are taking a cue from those sites to deploy more socially minded communication and collaboration tools. Does taking a more social, collaborative approach work?

Computerworld
ARN
Techworld
CMO