Stacy Collett, CIO.com

Stacy Collett

CIO.com

New York, NY, United States

Contact Stacy

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • CIO.com
  • Network World
  • CSOonline
  • ITworld
  • Computerworld

Past articles by Stacy:

6 key board questions CIOs must be prepared to answer

The board expects the CIO to be a critical agent for business change. Be ready to address these tricky, timely questions to assure your board that IT is being led in the right direction. → Read More

8 servant leadership do’s and don’ts

CIOs are increasingly embracing the servant leadership approach. The following tips will help you balance top-down direction and accountability with bottom-up empowerment. → Read More

Hot network certifications: Multi-skill certs to dominate 2021

As organizations shifted to home-based work, certifying bodies saw the biggest increase in entry-level networking certifications. But in 2021, more advanced, cross-certifications that combine skills will rank among the most sought-after credentials. → Read More

6 tips for innovating through a crisis

Whether innovating for survival or planning for a post-pandemic comeback, CIOs may find conditions ripe to challenge the status quo, remove barriers and make change → Read More

What a security career will look like in five years

Get ready for ‘BISOs’ in the business, security positions on the customer experience team, and AI taking over cyber jobs – but in a good way. → Read More

Network monitoring in the hybrid cloud/multi-cloud era

Most enterprises now use two or more cloud service providers, and 35% use up to five monitoring tools to keep tabs on hybrid cloud and multi-cloud environments. What’s the best approach to full network visibility? → Read More

5 ways to curb cybersecurity burnout

91% of CISOs suffer ‘moderate or high’ levels of stress. Here are some ways to help. → Read More

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. → Read More

Making the shift to product-based IT

Many organizations are shifting from project-based IT to product-based delivery. Here’s how they overcome common obstacles and drive success in concert with business stakeholders. → Read More

How CIOs tap startups to drive innovation

CIOs are increasingly cozying up to the cutting edge, using Shark Tank-like competitions, reverse pitches, and speed dating to identify startups that will fuel innovation and transform the business. → Read More

How to create business-savvy IT pros

IT leaders offer 5 tips for infusing IT staff with the business knowledge they need to succeed today — and in the years ahead. → Read More

The biggest issues CIOs face today

From security management to seeking out innovative technologies, CIOs are straddling operational and transformational roles to deliver new wins while keeping IT humming. → Read More

What is hybrid cloud really, and what's the best strategy?

The definition of hybrid cloud varies depending on who you ask, but it always involves using both private and public clouds, and you need a strategy. → Read More

CSO50 2018: Security risk management takes center stage

Nearly 20 percent of this year’s CSO50 Award winners took on security risk and compliance projects. Download the CSO50 2018 digital issue to read their stories, as well as descriptions of all 50 winning projects. → Read More

Keeping pace with security automation

Stressed and stretched, IT security teams look to automation for relief. → Read More

Credit card fraud: What you need to know now

Credit and payment card thieves are getting more sophisticated as chipped cards drive them to account takeover and card-not-present schemes. → Read More

Five new threats to your mobile device security

Cyber criminals are stepping up their attacks on mobile devices with new weapons and variations on old ones. → Read More

Five new threats to your mobile security

Cyber criminals are stepping up their attacks on mobile devices with new weapons and variations on old ones. → Read More

5 reasons to take a fresh look your security policy

Evolving ransomware and DDoS attacks, new technology such as IoT, and changing user behavior are all good reasons to revise your security policy. → Read More

Four ways to use open data sources to find cybersecurity candidates

Publicly available data from government and other sources can help you find the right security talent. → Read More