Strategy

Strategy news, analysis, research, how-to, opinion, and video.

jigsaw ransomware logo
museum showcase

video

How to create a culture of innovation

CIO.com's Rich Hein spoke to seasoned IT leaders to learn the ways in which they foster a workplace culture that values and rewards innovation.

01 two one safely

How to keep IT security at the forefront during a merger

Security pros weigh in on how to keep IT security at the forefront during a merger

hackathon innovation

Banks find big innovation payoff in hackathons

U.S. Bank is the latest in a long line of banks to cultivate innovation through intense coding jams, but some analysts question whether such events yield tangible value.

understanding blockchain

How blockchain will disrupt your business

There are still challenges to overcome, but blockchain technology stands poised to rewrite how business is conducted if its potential is achieved. Are you ready?

1 briefcase

What you need to do to stop data from leaving with exiting employees

In some instances it is inadvertent that an employee takes files with them when they leave a job. But in most cases, it is done to get an advantage at their next job. Here is what you should do before they leave the premises.

budget

Key questions to mull as you head into infosec budgeting season

Tips for getting the budget past the financial people - from the financial professional's perspective.

Shine a spotlight on shadow IT and prosper

Why a security team embraces shadow IT

A group within Western Union information security team relies on cloud software, including content management, social collaboration and single sign-on tools to let employees to get their work done while protecting corporate data.

money meeting merger aquisition business deal

Striking a deal: will your cybersecurity issues hold up the next merger?

Cybersecurity due diligence can avoid discovering critical issues after a deal has gone through

0 primary

6 shocking gaps in your data security strategy

Find out where CISOs are shifting their investments to close 6 of the most challenging security gaps in today’s enterprise security strategies.

standing out crowd

Security by the people

Sometimes it takes a village. In the case of information security, sometimes it takes an employee. Forward thinking enterprises can go beyond simply providing IT security awareness training and hygiene tips for their users, and enlist...

web app puzzle

5 more critical IT policies you should have in place

In this article we cover part 2 of 10 IT policies every organization should have.

jeremy ariel rabkin

A gentler way to hack back

Hacking back doesn’t have to lead to a catastrophic cycle of retaliation if it’s done right, says a father-son team.

keeping score

What’s in a security score?

In May, FICO upped its own scoring game. It acquired cybersecurity firm QuadMetrics to create its own brand of enterprise security scores for enterprises. The new scoring tool, available in August, uses predictive analytics and...

privileged accounts

Businesses failing to secure privileged accounts

A new benchmark survey finds that more than half of organizations have a failing grade when it comes to securing privileged accounts that can give attackers access to their entire networks.

cyber attack stock image

10 facts every small business leader must act upon

Small businesses aren't immune from attack. In fact, a recent Ponemon study revealed 55 percent of small businesses surveyed have been compromised. Small business leaders need to understand 10 key fundamentals and take immediate...

digital transformation security

Security teams consulted too late on digital transformation

A new survey finds 76 percent of IT professionals with responsibility for security feel their security teams are brought in too late to have a meaningful impact on digital transformation projects.

hotel security

Omni Hotels' new CIO shores up cybersecurity amid data breach

Following the infiltration of the hotel chain’s network with payment card-stealing malware, Omni is looking to use analytics software to detect and quarantine attacks.

business person holding a briefcase 152121278

Update to risk management framework should be taken seriously

COSO, that same organization that sponsors that internal control framework for Sarbanes-Oxley control compliance, recently issued a long awaited exposure draft update to their Enterprise Risk Management framework. By translating the...

Load More