Articles By Cara Garretson

Vacation interruptus: Don’t let a tech crisis ruin a getaway

Vacation interruptus: Don’t let a tech crisis ruin a getaway

Planning on taking a vacation this summer? If you're a tech manager, you may find yourself with unwanted baggage --...

July 11th, 2011 Cara Garretson
Bad IT worker habits: Break them before they break you

Bad IT worker habits: Break them before they break you

Every worker develops a few bad habits -- maybe more than a few -- as the years on the job...

July 5th, 2011 Cara Garretson
The Annotated Feature: Lies my vendor told me

The Annotated Feature: Lies my vendor told me

The Annotated Feature is an ongoing series where we ask a Canadian CIO to offer their comments on a story...

May 9th, 2011 Cara Garretson
Virtualization solutions will find venture funding

Virtualization solutions will find venture funding

In 2008, investments in start-ups that target consumers are expected to remain significantly hotter than those in companies building enterprise...

December 17th, 2007 Cara Garretson
’60s cheque forger turned security consultant, during his interview at Computerworld’s Storage Networking World conference.

’60s cheque forger turned security consultant, during his interview at Computerworld’s Storage Networking World conference.

Those who engage in cybercrime know they need to stay ahead of technology to come up with new and different...

November 22nd, 2007 Cara Garretson
Identity theft focus of new Senate bill

Identity theft focus of new Senate bill

In light of the increasing numbers of identity theft victims, the Identity Theft Enforcement and Restitution Act of 2007 was...

October 22nd, 2007 Cara Garretson
CISOs move up the management ladder

CISOs move up the management ladder

The function of information security is splitting into two, with security technology implementation moving back into the IT department and...

June 7th, 2007 Cara Garretson
Security 3.0: Chess, not Whac-A-Mole

Security 3.0: Chess, not Whac-A-Mole

Companies that want to spend less of their IT budget on security and improve its effectiveness must “bake in” security...

June 7th, 2007 Cara Garretson
Beware the pod people

Beware the pod people

Are iPods really as innocent as they seem? Some believe that they pose a significant security risk to the organization....

April 30th, 2007 Cara Garretson
RFID threats: Don

RFID threats: Don

The recurring topic of RFID security flaws has been making headlines again lately. But unlike new e-mail viruses or Internet...

April 26th, 2007 Cara Garretson