Forget the territorial battles being fought at other companies between marketing and technology executives. At renowned athletic gear maker Adidas Group, the digital marketing approach is built on a real alliance between the two disciplines.
Security / Interviews
Smartphones aren't cheap, but they've become our window to the world. We use them to run our lives, stay plugged in and even get some work done. We can't live without 'em. And so we dig into our pockets every month to pay a huge phone bill despite our shoestring budget.
The problem with signature based security tools is you are vulnerable until the signature is released and distributed. Palo Alto Networks takes a different approach with Traps, so Network World Editor in Chief John Dix tracked down Palo Alto VP of Product Marketing Scott Gainey for an inside look at how Traps works.
Bill Clinton's run for presidency nearly derailed when rumors surfaced that he had smoked marijuana during his time in England. In an effort to control the damage, Clinton admitted that he indeed experimented with the illegal drug but "didn't inhale." Imagine how history might have changed if a video of a glassy-eyed Clinton with a joint between his lips had shown up on Youtube (which, of course, didn't exist at the time).
With a number of high-profile security breaches making headlines of late, organizations are increasingly realizing they must beef up their security teams or risk catastrophe. Matt Comyns, global co-head of the Cybersecurity practice at Russell Reynolds Associates, an executive leadership and search firm, sat down with CIO.com to discuss the changing role of the Chief Information Security Officer (CISO), the global cybersecurity landscape and why finding and retaining elite security talent is critical.
Canadian airline company WestJet is one of the earliest customers of VMware's NSX network virtualization tools, which initially reached for the tech to address a security issue. Network World Editor in Chief John Dix recently sat down with WestJet technologist Richard Sillito to learn what the company is learning about network virtualization and its broader NSX plans.
Catbird Networks Director of Product Management, Malcolm Reike, talks about how virtualization changes the security game with Network World Editor in Chief John Dix.
Jeff Schilling, who joined cloud hosting startup FireHost this week as chief security officer, knows a thing or two about cybersecurity.
Michael Keithley has more than two decades of experience as a CIO. However, the IT veteran says he's seeing more change now than ever before. CIO.com's Tom Kaneshige sat down with Keithley to talk about the challenges he and his colleagues face, the need to speak the same language as the business side and the reality of what lies ahead for CIOs who refuse to change their approach.
The terms "Internet of Things" (IoT) and "connected home" are two of the trendiest buzzwords in the technology world today. And while both clearly offer very real potential, they also introduce their own share of risk, particularly if they're not approached with caution, according to Jerry Irvine, an owner and CIO of IT outsourcing services firm, Prescient Solutions.
The INFORMS code of ethics requires analytics professionals to report unbiased answers, not just what the client wants to hear.
Apple's first rule about enterprise features: 'You don't talk about enterprise features.' While you may not hear it from Cupertino, BYOD features abound in iOS 7 and, according to AirWatch's Blake Brannon, they are 'as innovative as we've seen from Apple.'
Good Technology has become one the leaders in mobile management, amassing more than 4,000 customers, including many in government and highly regulated industries.
Cloud computing gives organisations the opportunity to rethink many traditional IT practices, but it may be a particularly good fit for disaster recovery and business continuity.
As the evasion of consumer tech changes IT, it makes sense that support for consumer devices would start to reflect the retail experience. Think Apples Genius Bar. Mike Burgio of Inergex, an IT services firm, talks about why IT leaders need to think about hitting the bar.
Cloud storage, text messaging, poor accountability and the "Bad Leaver" open the doors to data breaches in a BYOD environment, says a cyber-crime expert in this CIO.com interview.
At Energy Future Holdings, CEO John Young emphasizes the human factors behind IT, supports standardization and expects the CIO to work with business partners.
A "bring your own support" movement is sprouting up within BYOD programs as employees become more self-sufficient. Is this a death knell for the IT help desk? One possible savior: an enterprise Genius Bar.
There's no easy path to iPad adoption and a bogged-down iPad pilot program can spell disaster. Apple could be more helpful to businesses, but there are ways to simplify complicated iPad migrations. Here's what a tech services firm learned while helping Cablevision configure 3,000 iPads.
For Dell Software CIO Carol Fawcett, "BYOD" is not about being an expert on every mobile device in the world; it's about giving workers secure access to the apps and data they need on whatever device they are using.
- Transition to the Agile Data Centre. Partnering with innovators to drive business and IT forward.
- AusCERT2015 | st-5th June 2015 | Hear from Brian Krebs, Eva Galperin and Bruce Schneier - New registration packages
- Only Citrix securely delivers everything you need for a truly mobile workspace wherever you go
- Check out the NEW f5 Resource centre | New content, infographics, white papers and research
- NSW Supreme Court rules against NBN in TPG Fibre-to-the-Building case
- Enprise Solutions kick-starts Australian expansion with new BDM
- Veritas spin-off takes another step with new APJ leader
- The Australian security appliances market is at its best: IDC Australia
- KPMG and Appian tackle disruption through strategic alliance