Security / Interviews

Adidas CIO plays to win at digital marketing

Forget the territorial battles being fought at other companies between marketing and technology executives. At renowned athletic gear maker Adidas Group, the digital marketing approach is built on a real alliance between the two disciplines.

Written by Elizabeth Heichler18 Feb. 15 03:13

COPE Offers IT and Workers an Alternative to BYOD

Smartphones aren't cheap, but they've become our window to the world. We use them to run our lives, stay plugged in and even get some work done. We can't live without 'em. And so we dig into our pockets every month to pay a huge phone bill despite our shoestring budget.

Written by Tom Kaneshige15 Nov. 14 05:12

Palo Alto says its new endpoint protection tool can stop the bad stuff in its tracks

<em>The problem with signature based security tools is you are vulnerable until the signature is released and distributed. Palo Alto Networks takes a different approach with Traps, so Network World Editor in Chief John Dix tracked down Palo Alto VP of Product Marketing Scott Gainey for an inside look at how Traps works.</em>

Written by John Dix13 Nov. 14 03:28

You are responsible for your own Internet privacy

Bill Clinton's run for presidency nearly derailed when rumors surfaced that he had smoked marijuana during his time in England. In an effort to control the damage, Clinton admitted that he indeed experimented with the illegal drug but "didn't inhale." Imagine how history might have changed if a video of a glassy-eyed Clinton with a joint between his lips had shown up on Youtube (which, of course, didn't exist at the time).

Written by Tom Kaneshige24 Oct. 14 02:32

Inside the Changing Role of the CISO

With a number of high-profile security breaches making headlines of late, organizations are increasingly realizing they must beef up their security teams or risk catastrophe. Matt Comyns, global co-head of the Cybersecurity practice at Russell Reynolds Associates, an executive leadership and search firm, sat down with CIO.com to discuss the changing role of the Chief Information Security Officer (CISO), the global cybersecurity landscape and why finding and retaining elite security talent is critical.

Written by Sharon Florentine01 July 14 06:28

Early user of VMware NSX net virtualization tool extols fine grain controls

Canadian airline company WestJet is one of the earliest customers of VMware's NSX network virtualization tools, which initially reached for the tech to address a security issue. Network World Editor in Chief John Dix recently sat down with WestJet technologist Richard Sillito to learn what the company is learning about network virtualization and its broader NSX plans.

Written by John Dix26 June 14 04:09

Securing the virtual world

Catbird Networks Director of Product Management, Malcolm Reike, talks about how virtualization changes the security game with Network World Editor in Chief John Dix.

Written by John Dix26 June 14 03:36

CIOs must adapt or risk being replaced

Michael Keithley has more than two decades of experience as a CIO. However, the IT veteran says he's seeing more change now than ever before. CIO.com's Tom Kaneshige sat down with Keithley to talk about the challenges he and his colleagues face, the need to speak the same language as the business side and the reality of what lies ahead for CIOs who refuse to change their approach.

Written by Tom Kaneshige13 May 14 03:04

Cybersecurity Expert and CIO: Internet of Things is 'Scary as Hell'

The terms "Internet of Things" (IoT) and "connected home" are two of the trendiest buzzwords in the technology world today. And while both clearly offer very real potential, they also introduce their own share of risk, particularly if they're not approached with caution, according to Jerry Irvine, an owner and CIO of IT outsourcing services firm, Prescient Solutions.

Written by Al Sacco25 March 14 21:36

What Does iOS 7 Bring to the BYOD Party?

Apple's first rule about enterprise features: 'You don't talk about enterprise features.' While you may not hear it from Cupertino, BYOD features abound in iOS 7 and, according to AirWatch's Blake Brannon, they are 'as innovative as we've seen from Apple.'

Written by Tom Kaneshige27 Aug. 13 00:00

Cloud computing causing rethinking of disaster recovery

Cloud computing gives organisations the opportunity to rethink many traditional IT practices, but it may be a particularly good fit for disaster recovery and business continuity.

Written by John Dix31 July 13 00:42

Will BYOD Give Rise to the Enterprise Genius Bar?

As the evasion of consumer tech changes IT, it makes sense that support for consumer devices would start to reflect the retail experience. Think Apples Genius Bar. Mike Burgio of Inergex, an IT services firm, talks about why IT leaders need to think about hitting the bar.

Written by Tom Kaneshige01 July 13 17:38

The BYOD Mobile Security Threat Is Real

Cloud storage, text messaging, poor accountability and the "Bad Leaver" open the doors to data breaches in a BYOD environment, says a cyber-crime expert in this CIO.com interview.

Written by Tom Kaneshige30 May 13 19:40

Killing the Help Desk Softly - or Blowing It Up

A "bring your own support" movement is sprouting up within BYOD programs as employees become more self-sufficient. Is this a death knell for the IT help desk? One possible savior: an enterprise Genius Bar.

Written by Tom Kaneshige22 March 13 18:26

Apple Expert Details How to Keep iPad Enterprise Migrations in Check

There's no easy path to iPad adoption and a bogged-down iPad pilot program can spell disaster. Apple could be more helpful to businesses, but there are ways to simplify complicated iPad migrations. Here's what a tech services firm learned while helping Cablevision configure 3,000 iPads.

Written by Tom Kaneshige08 Feb. 13 22:06

Dell Software CIO says BYOD is not about devices

For Dell Software CIO Carol Fawcett, "BYOD" is not about being an expert on every mobile device in the world; it's about giving workers secure access to the apps and data they need on whatever device they are using.

Written by Tom Kaneshige05 Dec. 12 20:10
  • []