

John Edwards
John Edwards is a veteran business technology journalist. His work has appeared in The New York Times, The Washington Post, and numerous business and technology publications, including CIO, Computerworld, Network World, CFO Magazine, IBM Data Management Magazine, RFID Journal, and Electronic Design. He has also written columns for The Economist's Business Intelligence Unit and PricewaterhouseCoopers' Communications Direct. John has authored several books on business technology topics. His work began appearing online as early as 1983. Throughout the 1980s and 90s, he wrote daily news and feature articles for both the CompuServe and Prodigy online services. His "Behind the Screens" commentaries made him the world's first known professional blogger.

5 questions CISOs should ask prospective corporate lawyers
Where can you find an attorney with the knowledge and insight to help you navigate thorny privacy and security issues? These five questions will help you find the right match.

7 steps to ensure a successful CISO transition
CISOs can play a critical role transitioning their replacements to the job and build a great reputation in the process. Follow this advice to ensure security operations don't miss a beat.

7 overlooked cybersecurity costs that could bust your budget
Is your cybersecurity budget covering all the bases? Here's a look at seven expenses that budget planners often minimize or fail to address.

How to choose the right security training provider for your team
When it comes to keeping your security team's skills sharp, there is no one-size-fits-all approach. Here's how to assess your needs and the ability of training services providers to meet them.

7 things to look for in a security awareness training provider
Not all cybersecurity awareness training vendors are the same or are right for your organization. Here's how to find the best match.

7 ways to optimize IT team productivity during difficult times
Even in today's challenging environment, inspiring staff members to function effectively isn't as hard as many IT leaders believe. The secret lies in smart, adaptable management.

Disaster recovery vs. security recovery plans: Why you need separate strategies
Responding to a cyber security incident has its own unique objectives and requires its own recovery plan.
A Hardened Approach to System Security
Glenn Phillips, president of Pelham, Ala.-based Forté, says that the dedicated Windows workstations his company sells to hospital emergency room administrators must not only be secure, but absolutely tamperproof as well. After...
-
Video/Webcast
Sponsored -
eBook
Sponsored -
White Paper
-
White Paper
-
eBook
Sponsored