Stacy Collett

Contributing Writer

Stacy Collett is a contributing writer for Computerworld, CSO, and Network World, covering a variety of security and risk issues.

Closing the security gap in OT/IT convergence

What is security's role in digital transformation?

What is security's role in digital transformation?

With security regaining priority in digital strategies, CISOs are dispersing security responsibility throughout the organization and working to transform the IT culture.

What a security career will look like in five years

What a security career will look like in five years

Get ready for ‘BISOs’ in the business, security positions on the customer experience team, and AI taking over cyber jobs – but in a good way.

5 signs your security culture is toxic (and 5 ways to fix it)

5 signs your security culture is toxic (and 5 ways to fix it)

Here's how to get the security culture you want if you see these warning signs in your organization.

5 tips for structuring your security organization for growth

5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface.

5 ways to curb cybersecurity burnout

5 ways to curb cybersecurity burnout

91% of CISOs suffer ‘moderate or high’ levels of stress. Here are some ways to help.

The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook.

Keeping pace with security automation

Keeping pace with security automation

Stressed and stretched, IT security teams look to automation for relief.

CSO50 2018: Security risk management takes center stage

CSO50 2018: Security risk management takes center stage

Nearly 20 percent of this year’s CSO50 Award winners took on security risk and compliance projects. Download the CSO50 2018 digital issue to read their stories, as well as descriptions of all 50 winning projects.

Credit card fraud: What you need to know now

Credit card fraud: What you need to know now

Credit and payment card thieves are getting more sophisticated as chipped cards drive them to account takeover and card-not-present schemes.

Five new threats to your mobile security

Five new threats to your mobile security

Cyber criminals are stepping up their attacks on mobile devices with new weapons and variations on old ones.

5 reasons to take a fresh look at your security policy

5 reasons to take a fresh look at your security policy

Evolving ransomware and DDoS attacks, new technology such as IoT, and changing user behavior are all good reasons to revise your security policy.

Load More