The Wayback Machine - https://web.archive.org/web/20111111061442/http://www.cioupdate.com/

Innovation Without Boundaries

Innovative enterprises build a culture that embraces a left-brain/right-brain approach to creative thinking, executing, and communicating, writes Faisal Hoque of BTM Corp.

feature 1 image

Two Factor Authentication: SMS vs. Tokens

Are one-time passwords sent via cell phone text messages more secure than traditional hardware tokens?

feature 2 image

Taming BIG Data: Taking Back Control, Part 2 - Creation

You have to figure out where your data comes from if you ever want to put controls in place to manage and exploit it, writes information management strategist Stephen Boschulte.

feature 3 image

6 Tips for Better Mobile Security

You need to take mobile device security just as seriously as you do for your PCs and laptops.

feature 4 image

The CIO’s Guide to e-Discovery in the Cloud

The patch-work of jurisdictions and bolt-on federal rules could leave you in a very bad position if you don't know where your data is, writes Jake Frazier of the Compliance, Governance and Oversight Council (CGOC).

feature 5 image
Next:
Top Stories by Section

Features

Innovation Without Boundaries


Innovative enterprises build a culture that embraces a left-brain/right-brain approach to creative thinking, executing, and communicating, writes Faisal Hoque of BTM Corp.

Two Factor Authentication: SMS vs. Tokens


Are one-time passwords sent via cell phone text messages more secure than traditional hardware tokens?

Taming BIG Data: Taking Back Control, Part 2 - Creation


You have to figure out where your data comes from if you ever want to put controls in place to manage and exploit it, writes information management strategist Stephen Boschulte.

6 Tips for Better Mobile Security


You need to take mobile device security just as seriously as you do for your PCs and laptops.

The CIO’s Guide to e-Discovery in the Cloud


The patch-work of jurisdictions and bolt-on federal rules could leave you in a very bad position if you don't know where your data is, writes Jake Frazier of the Compliance, Governance and Oversight Council (CGOC).







IT Offers