John Edwards

Contributing writer

John Edwards is a veteran business technology journalist. His work has appeared in The New York Times, The Washington Post, and numerous business and technology publications.

7 steps to protect against ransomware-related lawsuits

7 ways technical debt increases security risk

7 ways technical debt increases security risk

Shoddily developed and deployed projects can leave your enterprise vulnerable to attacks. Here's how to stop technical debt from sending your organization to the cyber-poorhouse.

8 things CISOs should be thinking about, but probably aren't

8 things CISOs should be thinking about, but probably aren't

CISOs need to cover all the security bases. The problem is, some of the bases are easy to overlook.

Top 5 skills a SOC analyst needs

Top 5 skills a SOC analyst needs

Whether building a new security operations center or revamping an existing one, staffing it with analysts that are equipped with these skills should be priority number one.

The 7 deadly sins of records retention

The 7 deadly sins of records retention

Record retention is both a fact of life and a growing headache for organizations burdened by a spiraling number of regulations and legal obligations. Here are worst (and best) practices for securing data and documents.

Security job candidate background checks: What you can and can't do

Security job candidate background checks: What you can and can't do

Enterprise cybersecurity begins with a trustworthy staff. Here's how to ensure that current and prospective team members aren't hiding any skeletons.

How to reboot a broken or outdated security strategy

How to reboot a broken or outdated security strategy

CISOs talk about how they identify when they need a new security strategy and the process of developing it and selling the reboot to stakeholders.

5 questions CISOs should ask prospective corporate lawyers

5 questions CISOs should ask prospective corporate lawyers

Where can you find an attorney with the knowledge and insight to help you navigate thorny privacy and security issues? These five questions will help you find the right match.

7 steps to ensure a successful CISO transition

7 steps to ensure a successful CISO transition

CISOs can play a critical role transitioning their replacements to the job and build a great reputation in the process. Follow this advice to ensure security operations don't miss a beat.

7 overlooked cybersecurity costs that could bust your budget

7 overlooked cybersecurity costs that could bust your budget

Is your cybersecurity budget covering all the bases? Here's a look at seven expenses that budget planners often minimize or fail to address.

How to choose the right security training provider for your team

How to choose the right security training provider for your team

When it comes to keeping your security team's skills sharp, there is no one-size-fits-all approach. Here's how to assess your needs and the ability of training services providers to meet them.

7 things to look for in a security awareness training provider

7 things to look for in a security awareness training provider

Not all cybersecurity awareness training vendors are the same or are right for your organization. Here's how to find the best match.

7 ways to optimize IT team productivity during difficult times

7 ways to optimize IT team productivity during difficult times

Even in today's challenging environment, inspiring staff members to function effectively isn't as hard as many IT leaders believe. The secret lies in smart, adaptable management.

Disaster recovery vs. security recovery plans: Why you need separate strategies

Disaster recovery vs. security recovery plans: Why you need separate strategies

Responding to a cyber security incident has its own unique objectives and requires its own recovery plan.

A Hardened Approach to System Security

Glenn Phillips, president of Pelham, Ala.-based Forté, says that the dedicated Windows workstations his company sells to hospital emergency room administrators must not only be secure, but absolutely tamperproof as well. After...

Load More