Mary K. Pratt

Contributing Writer

Mary K. Pratt is a freelance writer based in Massachusetts.

6 signs the CIO-CISO relationship is broken — and how to fix it

How to establish your business’s risk tolerance

How to establish your business’s risk tolerance

Knowing your business risk appetite allows you to align security efforts to the business needs, prioritizing resources and spending on those areas where organizational leaders have the least appetite for risk. Here's how to do it.

Why security-IT alignment still fails

Why security-IT alignment still fails

Many organizations struggle to get IT and security on the same page and stay in synch as their enterprises speed ahead with digital transformation initiatives. Here's how to overcome some of the most common obstacles.

12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board.

3 top multi-cloud security challenges, and how to build a strategy

3 top multi-cloud security challenges, and how to build a strategy

A number of security best practices have emerged alongside the growth of the multi-cloud environment, security experts say, and there are several critical steps that all organizations should take as they develop their own security...

Secrets of 'shift left' success

Secrets of 'shift left' success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.

For strong API security, you need a program not a piecemeal approach

For strong API security, you need a program not a piecemeal approach

When designed and managed properly, APIs can be less problematic than traditional integration methods and can actually increase an organization's security posture.

Evaluating patch management software: 6 key considerations

Evaluating patch management software: 6 key considerations

Given the breadth of software systems in any given organization and the volume of patches being released by vendors, patch management software is a critical capability within IT environments today. Here's how to choose the tools...

6 steps for a solid patch management process

6 steps for a solid patch management process

Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need...

What is an intrusion detection system? How an IDS spots threats

What is an intrusion detection system? How an IDS spots threats

An intrustion detection system (IDS) is a software application or hardware appliance that monitors traffic moving on networks and through systems to search for suspicious activity and known threats, sending up alerts when it finds...

What is Zero Trust? A model for more effective security

What is Zero Trust? A model for more effective security

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

5 ways users circumvent security measures and how to prevent it

5 ways users circumvent security measures and how to prevent it

Workers usually choose convenience over security, especially if you force them to jump through too many hoops. But there are steps you can take to shift the balance back in security's favor.

Load More