Strategy

Strategy news, analysis, research, how-to, opinion, and video.

gap stretching
Group of executives holding trophy photo winners people men woman award

00 title awareness training

Does security awareness training need a new, stronger name?

Security awareness training can help change the security culture through ongoing attention on relevant topics like social engineering. Nevertheless, stale, old, awareness material certainly doesn’t help and too many programs keep...

communication breakdown

Fixing the communications breakdown between IT security and the board and c-suite

Stop buying the first security solution that comes down the pike and solve the communications logjam first.

supply chain

Technology levels the vendor playing field

Gone are the days when the largest vendor in their space was the "right" choice when procuring software. It's time for that viewpoint to change, as the modern age of technology has opened up a world of options for organizations to...

1 immersive

Why you need to develop an immersive security strategy

Immersive security is a radical approach that utilizes advanced visualization techniques to enable a multidimensional situational awareness of the network. By being ‘in the data’ security professionals are able to better and more...

shaking hands

CISOs, it’s time to bury the hatchet with your CIO

The Chief Information Security Officer and the Chief Information Officer can be awkward bedfellows. We look at the how the two execs can work better together.

open gate access

Pain in the PAM

In order to prevent security breaches, insider attacks and comply with regulatory mandates, organizations must proactively monitor and manage privileged access. As the compromise and misuse of identity is often at the core of modern...

ISAO standards organization sets guidelines for sharing information

University of Texas at San Antonio (UTSA), the Information Sharing and Analysis Organization (ISAO) Standards Organization, published four guidance documents on creating and operating an ISAO.

body outline meeting

Time to kill security awareness training

Security awareness is a tired concept and has not worked. It is time to replace it with true education and engagement.

jigsaw ransomware logo

Ransomware from Stoned to pwned

When I was in the trenches as a defender I saw all manner of malicious software. The first one I ever encountered back in the late 80s was the Stoned virus. This was a simple program that was lobbying the infected computer...

museum showcase

How to protect your mission-critical information

A new report by the Information Security Forum (ISF) outlines the steps you can take to determine your mission-critical information assets &and create customized plans for protecting them.

video

How to create a culture of innovation

CIO.com's Rich Hein spoke to seasoned IT leaders to learn the ways in which they foster a workplace culture that values and rewards innovation.

01 two one safely

How to keep IT security at the forefront during a merger

Security pros weigh in on how to keep IT security at the forefront during a merger

hackathon innovation

Banks find big innovation payoff in hackathons

U.S. Bank is the latest in a long line of banks to cultivate innovation through intense coding jams, but some analysts question whether such events yield tangible value.

understanding blockchain

How blockchain will disrupt your business

There are still challenges to overcome, but blockchain technology stands poised to rewrite how business is conducted if its potential is achieved. Are you ready?

1 briefcase

What you need to do to stop data from leaving with exiting employees

In some instances it is inadvertent that an employee takes files with them when they leave a job. But in most cases, it is done to get an advantage at their next job. Here is what you should do before they leave the premises.

budget

Key questions to mull as you head into infosec budgeting season

Tips for getting the budget past the financial people - from the financial professional's perspective.

Shine a spotlight on shadow IT and prosper keyboard programmer hands

Why a security team embraces shadow IT

A group within Western Union information security team relies on cloud software, including content management, social collaboration and single sign-on tools to let employees to get their work done while protecting corporate data.

money meeting merger aquisition business deal

Striking a deal: will your cybersecurity issues hold up the next merger?

Cybersecurity due diligence can avoid discovering critical issues after a deal has gone through

Load More