Stacy Collett

Contributing Writer

Stacy Collett is a contributing writer for Computerworld, CSO, and Network World, covering a variety of security and risk issues.

Navigating the muddy waters of enterprise infosec

Navigating the muddy waters of enterprise infosec

Information security finally has executives’ attention, but aligning with business needs is still challenging.

Can cybersecurity save the November elections?

Can cybersecurity save the November elections?

Cyber pros weigh in on how to protect voter databases and the election process.

How cyber security pros transition to board level decision makers

How cyber security pros transition to board level decision makers

There is no manual on how to get noticed by key executives. Here are some tips for getting on a board of directors as the cybersecurity expert.

What’s in a security score?

What’s in a security score?

In May, FICO upped its own scoring game. It acquired cybersecurity firm QuadMetrics to create its own brand of enterprise security scores for enterprises. The new scoring tool, available in August, uses predictive analytics and...

How to attract a board-level cybersecurity expert

How to attract a board-level cybersecurity expert

Suzanne Vautrinot’s impressive cybersecurity experience has been in high demand since she retired from the U.S. Air Force in October 2013. As a major general and commander, she helped create the DoD's U.S. Cyber Command and led the...

Why legal departments begrudge the cloud

Why legal departments begrudge the cloud

Legal professionals are by their nature a skeptical and cautious lot, but the sharp rise in cloud-based applications being used by enterprises and law firms, as well as recent high-profile law firm security breaches, has many legal...

Companies high on virtualization despite fears of security breaches

Companies high on virtualization despite fears of security breaches

While no one thinks security problems will go away, companies are willing to tolerate the risk in the name of agility, flexibility and lower costs.

Should your board of directors include a cybersecurity expert?

Should your board of directors include a cybersecurity expert?

The pros and cons of proposed legislation to identify a board’s cybersecurity pro.

CSO50 2016: Centura Health’s security rearchitecture staves off phishing scam

CSO50 2016: Centura Health’s security rearchitecture staves off phishing scam

The CSO50 recognizes 50 security projects, taken on by 45 organizations, that demonstrate outstanding thought leadership and business value. These are their stories.

CSO50 2016 winners announced

CSO50 2016 winners announced

The CSO50 recognizes 50 security projects, taken on by 45 organizations, that demonstrate outstanding thought leadership and business value. These are their stories.

CSO50 2016: UN development program provides cybersecurity assistance

CSO50 2016: UN development program provides cybersecurity assistance

The CSO50 recognizes 50 security projects, taken on by 45 organizations, that demonstrate outstanding thought leadership and business value. These are their stories.

The balance of career power is shifting toward security

The balance of career power is shifting toward security

Security positions are up, other IT postings way down.

Why any organization can suffer a healthcare breach, and 5 tips for keeping PHI safe

Why any organization can suffer a healthcare breach, and 5 tips for keeping PHI safe

Industry professionals say that companies should identify where PHI data is hiding in their organization and take steps to lock it down.

Can collaborative security work?

Can collaborative security work?

Many IT security pros say sharing is good, but with government, not so much.

Move over CISO: The Chief Data Officer may be sharing part of your job

Move over CISO: The Chief Data Officer may be sharing part of your job

The C-suite is getting a little more crowded these days. Pull up a chair for the chief data officer, and it might be next to the CISO.

CISOs learn 5 tough lessons about conveying security risks

CISOs learn 5 tough lessons about conveying security risks

Honesty can still be the best policy, but there are some precautionary measures to take.

Five moves for every new CISO’s playbook

Five moves for every new CISO’s playbook

CISOs are pulling up roots and moving to new companies at a rapid pace as demand grows for leaders with cyber and information security expertise and salaries skyrocket. Many seasoned infosec professionals are also joining the CISO...

How long does it take for employees to be security conscious?

How long does it take for employees to be security conscious?

How much security awareness training is enough?

Scraping away profits

Scraping away profits

Web scraping is on the rise. How to detect and protect your intellectual property.

FTC’s actions put CSOs on high alert

FTC’s actions put CSOs on high alert

Four takeaways from the FTC’s power to sue for lax security.

Load More