Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Putting on a red hat and trying to understand the motivations, expectations, behaviors, and goals of bad actors can be a key part of a solid cybersecurity plan. → Read More
Getting ready for one of the most demanding review processes in cybersecurity can be daunting, but experts say preparing for a SOC 2 audit can be an important part of a well-managed year-round security program. → Read More
Old perimeter-based defenses can throw up roadblocks to implementing a zero-trust strategy, but a measured, phased approach will see you through. → Read More
Carrier CPSO John Deskurakis developed a framework for product security that works for the lifecycle of all products across all business lines → Read More
Security moves fast. Here’s how experts say you should find the right balance among agility, stability, and price. → Read More
When insiders exhibit risky behaviors, good-natured bots reach out to provide support in this CSO50 award-winning project. → Read More
CISOs should revisit organizational structure as part of their overall strategic plans and after big shifts in enterprise needs. But experts warn that reorganizing alone isn’t a recipe for success. → Read More
Wherever you are on your journey toward building vulnerability management program, these best practices will help you be more efficient and effective. → Read More
A comprehensive employee retention program is a key differentiator in tight talent markets. Here’s how to reduce employee turnover, retain top talent, and establish an engaged workforce. → Read More
CISO Tim Fitzgerald’s vulnerability management program has delivered measured improvements and earned the security team recognition as a business-enablement function. → Read More
CISOs are finding value in information sharing among trusted, vetted sources. Here’s how they are maximizing the intelligence gathered from these channels. → Read More
Forget the silver bullet; focus on cyber resiliency, advises the Lockheed Martin fellow. → Read More
As interest in environmental, social, and governance issues increases among investors, business partners, consumers, and employees, CISOs will need to shape their security and risk strategies to align with the organization’s ESG objectives. It’s another step in the progression of the CISO role. → Read More
CISO Tim Byrd teams up with New York University Tandon School of Engineering to create a new educational pathway for TIAA employees. → Read More
It's only a matter of time before attackers target IoT data. Organizations must be ready with IoT data security best practices, including data encryption and visibility. → Read More
Talent is your biggest asset, and while you’ll never eliminate employee turnover, the following strategies can help you keep your best. → Read More
With technology ever more critical to enterprise success and survival, IT leaders are taking a larger, more strategic role in assessing business challenges and opportunities. → Read More
A growing number of CIOs are committing most if not all of IT to the cloud to improve security, flexibility, and agility — and to free up teams to focus on innovation and enhancing IT services. → Read More
Research reveals a glaring disconnect between the need for security training and its perceived value. But organizations that have made their awareness programs a strategic priority and adopted more modern approaches are finding success. → Read More
Salesmanship is a key skill in getting buy-in for IT spend. Here’s how to rally support for IT projects by crafting sales pitches that put busines benefits — not the technology itself — front and center. → Read More