Doug Drinkwater

Doug is the international editor of TabTimes.com.

How to stop wasting money on security shelfware

How to stop wasting money on security shelfware

Investing in security tools that end-up on the shelf or underutilized is not inevitable, and it can be reduced or even eliminated by some proactive and surprisingly simple first steps.

How and why to hire a CISO

How and why to hire a CISO

If you haven't yet hired a chief information security officer, you're not alone. Here are the considerations for creating the position and making the hire.

What's the key to surviving as a cyber-security start-up?

What's the key to surviving as a cyber-security start-up?

It’s always a gamble to establish a start-up, but if you were to choose any sector where you’d fancy your chances of success, it would surely be cyber-security.

How CISOs find their perfect job

How CISOs find their perfect job

The Chief Information Security Officer (CISO) is in high demand. But in a world where demand heavily outstrips supply, how do CISOs ensure they pick the right job?

AI will transform information security, but it won’t happen overnight

AI will transform information security, but it won’t happen overnight

Artificial Intelligence technologies are evolving quickly, but can they aid an InfoSec community still grappling with default passwords and SQLi attacks?

Are Virtual CISOs the answer to your security problems?

Are Virtual CISOs the answer to your security problems?

Virtual CISOs can be an invaluable resource for companies with limited resources. But are they a short-term fix to a long-term problem?

Friends or enemies? Security vendors tiptoe towards collaboration

Friends or enemies? Security vendors tiptoe towards collaboration

The information security vendor community is extremely competitive. But when all suppliers supposedly share the common goal of making us as citizens and businesses secure, should they be doing more to work together?

How to get more from your security budget

How to get more from your security budget

Here’s how to get more from your stretched security budget.

Hiring the hidden gems: Should InfoSec hire from other industries?

Hiring the hidden gems: Should InfoSec hire from other industries?

The information security industry is in desperate need of skilled personnel. But, as CSO investigates, some of those professionals could potentially be sourced from other industries.

CISOs, it’s time to bury the hatchet with your CIO

CISOs, it’s time to bury the hatchet with your CIO

The Chief Information Security Officer and the Chief Information Officer can be awkward bedfellows. We look at the how the two execs can work better together.

Cyber-security VCs are holding onto their cash – but that’s OK

Cyber-security VCs are holding onto their cash – but that’s OK

Are VCs cooling their interest in cyber-security companies? CSO investigates a market with just as many challenges and opportunities for investors.

Are InfoSec vendors ‘sowing confusion’ and selling ‘useless’ products?

Are InfoSec vendors ‘sowing confusion’ and selling ‘useless’ products?

Security vendors are doing just swell but how much do they do - outside of selling products - to help the world become a safer place? CSO Online investigates.

How to improve your incident response plan

How to improve your incident response plan

A well-formed, and well-tested, incident response can determine how well an organization responds to a data breach. CSO Online looks at how you can improve your own incident response plan so to reduce the impact of that data breach.

How to survive in the CISO hot-seat

How to survive in the CISO hot-seat

Today’s CISO is under more pressure than ever before. CSO Online looks at how security heads can survive in the hot-seat.

These CISOs explain why they got fired

These CISOs explain why they got fired

CISOs explain why, fair or not, they were let go by their company.

Is DevOps the Holy Grail for information security?

Is DevOps the Holy Grail for information security?

DevOps is the computing philosophy that, through unified agile software development and business operations, you can improve your products and time to market. But does it actually improve information security?

CISOs should take security training seriously

CISOs should take security training seriously

Security awareness training is pivotal to your organization’s information security posture, and, now, it’s more important than ever before.

Does a data breach really affect your firm’s reputation?

Data breaches can be costly, embarrassing and result in job losses and regulatory fines. But do they really affect companies’ long-term reputations? CSO Online investigates.

How CISOs and CEOs must work together

How CISOs and CEOs must work together

Information security chiefs continue to fight with C-level executives for more resources, bigger budgets and a greater understanding of the threats their business faces in the online world. But with daily hacks and data breaches now...

Banking on security innovation to beat the hackers

Banking on security innovation to beat the hackers

Banks are being targeted by cybercriminals, and that looks likely to continue in a world with more data and devices. The question is– are banks being innovative enough with information security to ward off the threats?

Load More