Security Leadership

Security Leadership news, information, and how-to advice

popup book
women conference

the interview movie

Howard Stern is right: Journalists should do a gut check on Sony coverage

Some information behind the Sony breach is important and valuable. But is it ethical and necessary to publish the private details of emails, sales contracts and other privileged information that has been leaked in this breach?

red carpet

Tapping into overlooked talent to improve your security career

Success in security is based on your ability to work with others. Improve your career by building a coalition of talent outside security.

00 job loss

9 data breaches that cost someone their job

'Tis the season for data breaches and with such always results in job loss.

Digital globes composed of ones and zeros

Virtual machines could be the gold standard for network security

Design a VM gold image right, build in all the security and monitoring that you need, keep it maintained, build out all the documentation your organization might need for security and compliance. When the business needs a new server...

parking lot shadowy figure

It's all about people

Why, at the end of the day your workforce is the most important first line of defense against external and internal threats.

businessman meditating

10 changes you can make to achieve security serenity now!

Some security changes are slow, expensive, and uncertain. Here are 10 of the best security changes that you can make with certainty, most of them with relative ease.

2015 predictions

10 cybersecurity predictions for 2015

Based on my history in this space, plus the fact that my day job of running CSC's Global Cybersecurity Consulting business lets me talk to and help hundreds of executives around the world, I wanted to offer my perspective on how 2014...

01 the year ahead

The biggest challenges faced by CIOs/CISOs heading into 2015

As the year winds to a close, CIOs and CISOs are faced with a number of challenges heading into 2015. CSO recently heard from several experts about the topic, each offering their opinion on what they feel would be the most important...

patch bandage band-aid first-aid ouch cure remedy

Report: Most companies fail at keeping track of patches, sensitive data

The majority of businesses don't have a solid system for tracking sensitive data or a mature patch management process, according to new survey of IT professionals.

2014 12 05 cso which story

Which security story are you telling?

Getting buy-in and support from other leaders comes from connecting. Popular advice suggests using a story. Use the right story built on 3 essential elements.

safety convenience shopping cart

Can security and convenience be mutually exclusive?

One objection that security professionals face every day is that you can’t have both security and convenience. Supposedly, they are on opposite ends of a mutually exclusive continuum. But that's just not so.

present gift snow holiday

Security executives reveal their holiday wish lists

Do you know any security executives who say they have everything they need to keep their organizations safe from threats? Chances are you don’t.

security landscape

What to do when starting a new security job

As our manager settles in at his new job, he has begun to see security vulnerabilities everywhere he looks.

handshake us flag

Why is it so hard for security startups to get government customers?

Selling to governments is not hopeless for security startups, but it is very difficult. Here's a story to show why

oops keyboard

Do you create stupid users?

A week doesn’t go by where we read about some attack that is precipitated by bad user actions.

pci security compliance

5 ways PCI is becoming more security-conscious next year

The newest Payment Card Industry Data Security Standard, PCI DSS 3.0, is going into effect at the start of 2015, and it is all about security instead of compliance.

pumpkin pie

Top reasons for CSOs to give thanks

In a profession defined by constant pressure and ever more sophisticated attacks, a few security pros reflect on reasons to give thanks.

security threat prevention

There is no substitution for in-house security professionals

oday, Security is a cost of doing business and we cannot effectively protect our organizations from the advanced capabilities of the criminals with just technology controls and consultants.

Load More