Leadership and Management

Leadership and management news, analysis, research, how-to, opinion, and video.

job fair security

puzzle pieces

Critical IT policies you should have in place

When we talk to clients as part of an IT audit we often find that policies are a concern, either the policies are out of date or just not in place at all. This often stems from the fact that no-one has been assigned to a permanent...

sharing business secrets

Do you know where your trade secrets are?

Cyber enabled theft of trade secrets is one of the security challenges of our time. In fact financial losses from trade secret theft dwarf those from privacy breaches. This post defines and describes trade secrets and an approach to...


This autonomous boat is attempting to cross an ocean using only solar power

The "Seacharger" hopes to become the first unmanned vehicle to cross an ocean using only solar energy during its month-long voyage from California to Hawaii.

harvard university

Deferring Harvard for a cybersecurity start-up

Why the gap year is fruitful for students and great for the enterprise


Cybersecurity recruitment in crisis

Globally cybersecurity is in crisis not solely from a lack of skilled personnel, but also from a lack of strategic direction and company’s inability to hire staff in an expedient, effective and efficient manner.

nyse stock trading

Regulators: cybersecurity poses biggest risk to global financial system

Last week, the chair of the Securities and Exchange Commission called cybersecurity the biggest risk facing the global financial industry. The SEC promises to step up regulation and Swift itself is expected to launch a new cyber...

managed security service providers

Security training programs don't do enough to mitigate insider risk

The threats posed by negligent insiders top many security professionals' lists of security concerns, but even organizations that have data protection and privacy training programs aren't getting through to their employees.

Trainerbot play

This ping pong robot can be programmed to be the perfect partner

The Trainerbot is a smart ping pong robot that aims to take your skills to the next level.

cyberinsurance thinkstock

Beyond technology: non-technical jobs in cybersecurity

What the enterprise needs now more than ever is cybersecurity insurance, a growing non-technical sector of the cyber industry.

recruiting thinkstock

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

oddball tech interview questions

Why CISO is the hardest tech role to fill

CISOs are hard to hire because there are far too few business executives with the right mix of business and technical chops. Also, companies aren’t exactly sure how much they’re willing to pay a CISO.

mit bug finder ruby on rails

Supplementing cyber security strategy with Artificial Intelligence

it could take a few weeks to months for Next Gen AI to ‘learn’ what is suspicious activity vs what is not. But it will be sharpened as user behaviors and the nature of business processes are analyzed. The objective is to automatically...

sql course

91% off Microsoft Certified Solutions Associate: SQL Server Certification Bundle - Deal Alert

Qualify for a Database Developer Position with Certified SQL Mastery.


Only the government knows what this top-secret Shuttle look-a-like is doing

It's been a year since the Air Force launched the secret X-37B. There are many theories about why it's up there, but the government isn't saying much.

building a culture of trust and engagement

Is lack of gender diversity in tech really shocking?

Male privilege and its impact on work place diversity and culture in the tech industry

itil course

98% off ITIL Foundation Training for IT Professionals - Deal Alert

Beginning with an assessment of your current IT service offering, you’ll be ready to take the ITIL Foundation exam by course’s end.

Apple brings down apps, mainly Chinese ones, with malware

Detecting low and slow insider threats

In my last post I discussed how machine learning could be used to detect phishing-based account compromise attacks using a real-world use case from the recent Verizon Data Breach Digest. This time I’ll examine how to detect insider...


How employees can share the IT security load

Security threats weigh heavily on IT and security professionals, and it is a responsibility that they should not bear alone. We all need to do our part to uphold the safeguarding of sensitive data.

Load More