John Edwards

John Edwards is a veteran business technology journalist. His work has appeared in The New York Times, The Washington Post, and numerous business and technology publications, including CIO, Computerworld, Network World, CFO Magazine, IBM Data Management Magazine, RFID Journal, and Electronic Design. He has also written columns for The Economist's Business Intelligence Unit and PricewaterhouseCoopers' Communications Direct. John has authored several books on business technology topics. His work began appearing online as early as 1983. Throughout the 1980s and 90s, he wrote daily news and feature articles for both the CompuServe and Prodigy online services. His "Behind the Screens" commentaries made him the world's first known professional blogger.

7 steps to ensure a successful CISO transition

7 overlooked cybersecurity costs that could bust your budget

7 overlooked cybersecurity costs that could bust your budget

Is your cybersecurity budget covering all the bases? Here's a look at seven expenses that budget planners often minimize or fail to address.

How to choose the right security training provider for your team

How to choose the right security training provider for your team

When it comes to keeping your security team's skills sharp, there is no one-size-fits-all approach. Here's how to assess your needs and the ability of training services providers to meet them.

7 things to look for in a security awareness training provider

7 things to look for in a security awareness training provider

Not all cybersecurity awareness training vendors are the same or are right for your organization. Here's how to find the best match.

7 ways to optimize IT team productivity during difficult times

7 ways to optimize IT team productivity during difficult times

Even in today's challenging environment, inspiring staff members to function effectively isn't as hard as many IT leaders believe. The secret lies in smart, adaptable management.

Disaster recovery vs. security recovery plans: Why you need separate strategies

Disaster recovery vs. security recovery plans: Why you need separate strategies

Responding to a cyber security incident has its own unique objectives and requires its own recovery plan.

A Hardened Approach to System Security

Glenn Phillips, president of Pelham, Ala.-based Forté, says that the dedicated Windows workstations his company sells to hospital emergency room administrators must not only be secure, but absolutely tamperproof as well. After...

Load More