Mary K. Pratt, CSOonline

Mary K. Pratt

CSOonline

Waltham, MA, United States

Contact Mary

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • CSOonline
  • CIO.com
  • TechTarget
  • Computerworld
  • Network World

Past articles by Mary:

Know thy enemy: thinking like a hacker can boost cybersecurity strategy

Putting on a red hat and trying to understand the motivations, expectations, behaviors, and goals of bad actors can be a key part of a solid cybersecurity plan. → Read More

How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready

Getting ready for one of the most demanding review processes in cybersecurity can be daunting, but experts say preparing for a SOC 2 audit can be an important part of a well-managed year-round security program. → Read More

How legacy tech impedes zero trust and what to do about it

Old perimeter-based defenses can throw up roadblocks to implementing a zero-trust strategy, but a measured, phased approach will see you through. → Read More

How Carrier’s product security team delivers the ‘right support for the right product’

Carrier CPSO John Deskurakis developed a framework for product security that works for the lifecycle of all products across all business lines → Read More

Locked in: How long is too long for security vendor contracts?

Security moves fast. Here’s how experts say you should find the right balance among agility, stability, and price. → Read More

How Code42 automates insider risk response

When insiders exhibit risky behaviors, good-natured bots reach out to provide support in this CSO50 award-winning project. → Read More

Is your security organization ripe for a reorg?

CISOs should revisit organizational structure as part of their overall strategic plans and after big shifts in enterprise needs. But experts warn that reorganizing alone isn’t a recipe for success. → Read More

8 keys to more effective vulnerability management

Wherever you are on your journey toward building vulnerability management program, these best practices will help you be more efficient and effective. → Read More

Employee retention: 10 strategies for retaining top talent

A comprehensive employee retention program is a key differentiator in tight talent markets. Here’s how to reduce employee turnover, retain top talent, and establish an engaged workforce. → Read More

Arm’s vulnerability management program has legs

CISO Tim Fitzgerald’s vulnerability management program has delivered measured improvements and earned the security team recognition as a business-enablement function. → Read More

Collective resilience: Why CISOs are embracing a new culture of openness

CISOs are finding value in information sharing among trusted, vetted sources. Here’s how they are maximizing the intelligence gathered from these channels. → Read More

Lockheed’s Teresa Merklin: There’s no such thing as a quick fix

Forget the silver bullet; focus on cyber resiliency, advises the Lockheed Martin fellow. → Read More

Aligning security strategy with ESG objectives: The next big issue for CISOs

As interest in environmental, social, and governance issues increases among investors, business partners, consumers, and employees, CISOs will need to shape their security and risk strategies to align with the organization’s ESG objectives. It’s another step in the progression of the CISO role. → Read More

TIAA boosts cybersecurity talent strategy with university partnership

CISO Tim Byrd teams up with New York University Tandon School of Engineering to create a new educational pathway for TIAA employees. → Read More

Fortify security with IoT data protection strategies

It's only a matter of time before attackers target IoT data. Organizations must be ready with IoT data security best practices, including data encryption and visibility. → Read More

9 reasons good employees leave — and how to prevent it

Talent is your biggest asset, and while you’ll never eliminate employee turnover, the following strategies can help you keep your best. → Read More

Redefining IT risk in post-pandemic world

With technology ever more critical to enterprise success and survival, IT leaders are taking a larger, more strategic role in assessing business challenges and opportunities. → Read More

Cloud or bust: IT leaders go all in on cloud computing

A growing number of CIOs are committing most if not all of IT to the cloud to improve security, flexibility, and agility — and to free up teams to focus on innovation and enhancing IT services. → Read More

Undervalued and ineffective: Why security training programs still fall short

Research reveals a glaring disconnect between the need for security training and its perceived value. But organizations that have made their awareness programs a strategic priority and adopted more modern approaches are finding success. → Read More

7 tips for selling the C-suite on IT investments

Salesmanship is a key skill in getting buy-in for IT spend. Here’s how to rally support for IT projects by crafting sales pitches that put busines benefits — not the technology itself — front and center. → Read More