This community is a resource for CIOs and CTOs, but it is open to everyone. Learn more.
This is your community. Please tell us what you think about it. All feedback is appreciated. Email Community Manager Jeff Caruso.
Review the community Registered User Privacy Statement and User Agreement.
Posted on 04/23/2014 by cnerney
The U.S. Federal Trade Commission held a one-day forum last June on mobile security, hearing from experts on a wide array of issues related to securing personal, medical and corporate data being access... read more →
Posted on 04/21/2014 by GeorgeVHulme
It didn’t take long at all. Only one day following the public disclosure of the Heartbleed vulnerability, attackers went quickly to work exploiting the widely discussed flaw in the OpenSSL protocol. ... read more →
Posted on 04/20/2014 by cnerney
I participated recently in a tweetchat (#CIOchat) on "the best way to organize IT." A number of participants made some excellent points that are particularly relevant in the consumerization era, and th... read more →
Posted on 04/17/2014 by GeorgeVHulme
One of the strange things about watching how organizations respond to information security threats is how – despite great awareness and concern over the risks – too often little is done to prevent them... read more →
Posted on 04/16/2014 by cnerney
Most any IT professional would agree that the ability to remotely protect data on a lost or stolen smartphone is an essential -- perhaps the most essential -- security tool in the enterprise BYOD era. ... read more →
This was one of the questions in the 2013 CIO Barometer report. Choose your answer then check out how CIOs responded in the report - now ava... Read more.