Mary K. Pratt

Contributing Writer

Mary K. Pratt is a freelance writer based in Massachusetts.

How to market security: 8 tips for recruiting users to your cause

How to market security: 8 tips for recruiting users to your cause

Getting users to care about security is a much-lamented challenge. What you need is a marketing plan.

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

Gaining the board's trust is key for elevating the security function to a strategic level. To do that, CISOs will need to get out of their technical comfort zone.

6 signs the CIO-CISO relationship is broken — and how to fix it

6 signs the CIO-CISO relationship is broken — and how to fix it

Successful collaboration between the IT and security leaders is essential but not always easy. Here are signs the relationship is broken – and 8 steps you should take to fix it.

How to establish your business’s risk tolerance

How to establish your business’s risk tolerance

Knowing your business risk appetite allows you to align security efforts to the business needs, prioritizing resources and spending on those areas where organizational leaders have the least appetite for risk. Here's how to do it.

Why security-IT alignment still fails

Why security-IT alignment still fails

Many organizations struggle to get IT and security on the same page and stay in synch as their enterprises speed ahead with digital transformation initiatives. Here's how to overcome some of the most common obstacles.

12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board.

3 top multi-cloud security challenges, and how to build a strategy

3 top multi-cloud security challenges, and how to build a strategy

A number of security best practices have emerged alongside the growth of the multi-cloud environment, security experts say, and there are several critical steps that all organizations should take as they develop their own security...

Secrets of 'shift left' success

Secrets of 'shift left' success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.

For strong API security, you need a program not a piecemeal approach

For strong API security, you need a program not a piecemeal approach

When designed and managed properly, APIs can be less problematic than traditional integration methods and can actually increase an organization's security posture.

Evaluating patch management software: 6 key considerations

Evaluating patch management software: 6 key considerations

Given the breadth of software systems in any given organization and the volume of patches being released by vendors, patch management software is a critical capability within IT environments today. Here's how to choose the tools...

6 steps for a solid patch management process

6 steps for a solid patch management process

Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need...

What is an intrusion detection system? How an IDS spots threats

What is an intrusion detection system? How an IDS spots threats

An intrustion detection system (IDS) is a software application or hardware appliance that monitors traffic moving on networks and through systems to search for suspicious activity and known threats, sending up alerts when it finds...

What is Zero Trust? A model for more effective security

What is Zero Trust? A model for more effective security

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

5 ways users circumvent security measures and how to prevent it

5 ways users circumvent security measures and how to prevent it

Workers usually choose convenience over security, especially if you force them to jump through too many hoops. But there are steps you can take to shift the balance back in security's favor.

What is SIEM software? How it works and how to choose the right tool

What is SIEM software? How it works and how to choose the right tool

Evolving beyond its log-management roots, today's security information and event management (SIEM) software vendors are introducing machine learning, advanced statistical analysis and other analytic methods to their products.

How to cope when mobile app development goes rogue

How to cope when mobile app development goes rogue

Business units often develop mobile apps on their own, turning to IT only when things go wrong. Better governance around business units and their mobile app demands can help alleviate the worst pain points.

Security among the hottest tech skills for 2017

Security among the hottest tech skills for 2017

Are your assets bankable in 2017? Hiring managers say they'll seek out these skills most in the New Year.

Security can't be left behind at a rapidly growing company

Security can't be left behind at a rapidly growing company

CIOs are finding ways to meet both the growing business needs as well as the evolving and increasing security requirements – without sacrificing the speed needed in fast-growing companies.

Balancing privacy with data collection in Allstate mobile app
Tip

Balancing privacy with data collection in Allstate mobile app

The insurance company collects telematics information from drivers with its Drivewise app, but says customers are comfortable trading information for enhanced safety.

Where does security fit in bi-modal IT departments?

Where does security fit in bi-modal IT departments?

There seems to be disagreement as to whether security workers should be in the innovation camp or look after the day-to-day operations.

Load More