IT Leadership

IT leadership and management news, analysis, research, how-to, opinion, and video.

Buses helped extend the reach of Africa Code Week in October, 2015.

Can computer science education be fun?

Games that focus on concepts over programming languages teach students to think like a computer while having a little fun.

nfl football new york jets buffalo bills

Exploit attacker playbooks to improve security

Rick Howard lines up a Security Slap Shot on improving security by going after attacker playbooks.

collaboration overload2

IT is NOT Cybersecurity

The differences between IT and Security teams and why you need both. In less than 10 years, we will all look back and wonder how businesses ever got along without both teams. Cybersecurity is not a function of IT operations.

Microsoft's new winning dev strategy: Open source

Rethinking what it means to win in security

Security leaders need to celebrate success with a better definition of winning.

Las Vegas Sign for Blackhat DefCon Event [by Skeeze / CC0 via Pixabay]

3 tips to get the most out of Black Hat/Defcon

Las Vegas. Hate it or love it, for seven days each year Sin City is the gathering place for BSides Las Vegas, Black Hat, and DEF CON. Combined, these events are arguably the largest security gathering in North America, with...

Graduates

So, you want a master's degree in cybersecurity?

A sampling of cybersecurity master's degree programs at universities in the U.S.

cybersecurityshutterstock 380217166

What CIOs need to know about authentication

Email is so critical to business communications today that many assume it's a safe and trustworthy medium, but recent cyberattacks prove it's not. What CIOs need to know about authentication and DMARC, a key tool to address this...

puzzle / teamwork / strategy / cooperation / collaboration

Security team leadership – the 'X' factor

Cybersecurity headhunter and leadership advisor Stephen Spagnuolo of ZRG Partners discusses how strong fundamental leadership can have a force multiplier effect on info security teams achieving optimal performance. There are several...

software audit

Avoid these 5 IT vendor management worst practices to avoid IT audit trouble

During IT audits we continue to find that both management and the risk function can do a lot more after the signing of the contract to at least ensure that the vendor is fulfilling their signed negotiated commitment. Make sure that...

coal power station

Critical Infrastructure Protection (CIP): Security problems exist despite compliance

CIP is just one of 14 mandatory NERC standards that are subject to enforcement in the U.S. However, it gets a good deal of attention because this regulation is centered around the cybersecurity of assets deemed to be critical to the...

European Union EU

General Data Protection Regulation (GDPR) requirements, deadlines and facts

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

Stack of legal documents with compliance and regulatory stamp

What are the GDPR requirements?

Here’s how the General Data Protection Regulation (GDPR) will change how companies process, store and secure EU customer data.

a byod education image.jpg

Money talks: Send your kid to cybersecurity school

Parents may want to think about cybersecurity as an alternative to medicine and law for their ambitious college-bound kids.

hipaa compliance 6

Security leaders need to focus on minimum effort, not minimum compliance

Experian's Michael Bruemmer takes a Security Slap Shot on the need to harness regulations to drive better security and not just minimum compliance.

money case ransom hundreds

The economics and impact of bad CISO leadership

Bad CISO leadership can be costly to a company, but even worse for your career.

problem solution blackboard

Cybersecurity has a huge skills gap! Will you be part of the problem or the solution?

There is currently a projected shortfall of 1.6 million qualified persons to fill cyber security roles. Since it is very clear we are vulnerable to cyber attacks and need to mitigate them we need people now. Complaining about...

transporter effect

7 elements of a successful security awareness program

Action items for CSOs looking to bolster their security awareness programs.

Thoughtful businessman question

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews.

smart cities iot

Getting smarter about making cities smart

Many cities claim to be ahead of smart curve, but find themselves handcuffed by custom systems

rtx2i8y7 2

Yes, Uber can – and will – get worse

It might be hard to imagine how things could get worse for Uber – but they will!

Load More