Leadership and Management

Leadership and management news, analysis, research, how-to, opinion, and video.

wanted women cios
Black Hat 2015

tight rope walking balance difficult challenge

Hunting for SOCs

New report looks at the trends, capabilities, and maturity levels of organizations’ security operations centers.

viaduct collapse

Using threat modeling to prove security success

Archie Agarwal shares experience and insights on how to move threat modeling from a confusing exercise to a powerful tool for security leaders

lock keyboard

No more ransomware?

A new project holds out hope in the war against ransomware attacks.

video

6 startups from CES to watch in 2017

6 innovative new companies showed off their products in the Eureka Park section of CES 2017.

man leaning on box of office belongings after being fired or laid off

How to get fired in 2017: Have a security breach

There are many reasons why IT professionals can be fired, but six out of the top nine are related to security. Fireable offenses included failing to modernize a security program, data breaches with unknown causes, data breaches that...

superheros

Do you have a cyber A-team?

The stakes are too high, especially for public companies, not to have a true cyber A-team. Companies of all sizes should ask themselves: do we have a real cyber A-team of executives and outside experts?

question man

How to gain the trust of the board

One of the keys that can make a good CSO presentation a great one is by ensuring the data being reported actually has relevance on specific business risks the organization is most likely to encounter (rather than assembling a...

security group team circuitry

The war for cybersecurity talent hits the Hill

More high-profile cyber-exploits and on-going allegations of Russian election-hacking have brought the issue to the fore.

sharing pizza pie
Q&A

Tackling cybersecurity threat information sharing challenges

What are the lessons learned and recommended practices for forming new information sharing organizations? That’s where the newly formed International Association of Certified ISAOs (IACI) comes in. IACI CEO Michael Echols explains.

head scratcher strategy thinking

Inadequate intelligence integration

Threat intelligence can add value to your security posture but it usually doesn’t.

blue mannequin fallen

Don't succumb to security fatalism

Protecting ourselves online can be incredibly complicated for anyone who isn't an expert, which has led to the current dismal state of security. Now the time for big changes to make things simpler.

2 money

Why you're not investing enough in IT security

The minute you outsource responsibility or governance of information security to a third party, you tie a noose around your neck and hand the end of the rope to a vendor.​

graduation cap with diploma stacked on books

Where to get a Master’s Degree in cybersecurity

2017 list of universities that offer a Master of Science (M.S.) in cybersecurity.

general john kelly

Trump’s DHS pick urges more coordination on cyberthreats

As the Trump transition team – including the president-elect himself -- warms to the intelligence community's assessment on Russian election hacking, Homeland Security nominee looks to build bridge with IT industry to fight...

boardroom presentation

Bringing boards up to cyber speed

The exponential growth of cyber risk has impacted roles for the CISO and the CEO, among others, but it has also left board members a little in the dark when it comes to understanding the risks associated with cybersecurity.

video

Panasonic's Lithium-ion battery will bend and twist

Panasonic's flexible Lithium-ion battery will maintain its electrical characteristics even after repeated bending.

us china russia

Russia, China -- and the US -- are biggest geopolitical cybersecurity threats

Russia and China have the more advanced cyber capabilities and are the highest potential of severe impact, but the US and its allies also pose global security concerns, according to a report released this morning by Flashpoint

video

These 3-D printed, swarm drones are a surveillance tool for the DOD

The Department of Defense is testing Perdix, autonomous micro-drones capable of collective decision-making and adaptive formation flying.

Load More