IT Strategy

IT Strategy | News, how-tos, features, reviews, and videos

high priority gauge
spot itleadership cio superhero businessman by yuganov konstantin shutterstock 373650874 2400x1600

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

8 things CISOs should be thinking about, but probably aren't

CISOs need to cover all the security bases. The problem is, some of the bases are easy to overlook.

cso50 usa awards

CSO50 2021 awards showcase world-class security strategies

Winners will be recognized at the annual CSO50 Conference + Awards taking place November 16-18, 2021.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

7 critical IT policies you should have in place

Putting a framework of IT policies that should be the foundation of every company's security plan.

Tech Spotlight   >   IT Leadership [intro]   >   One glowing arrow leads a pack of other arrows.

What IT leadership looks like in 2021

As IT leaders meet the challenges of the COVID era, only one thing is assured – more change is coming sooner than you think.

IDG Tech Spotlight  >  IT Leadership [ September 2020 ]

IT leaders grapple with the new normal

Five articles examine the challenges faced by leaders across all segments of IT – and the solutions that have made a difference.

CSO Digital Magazine  >  Summer 2020 [cover]

Redefining the CISO role: Why the top security job is gaining C-suite and boardroom status

Breach concerns, data privacy regulations, and a move to separate security from IT are elevating the importance of the security role.

A shield protects against COVID-19 coronavirus-related threats.

What's next? CISOs weigh in on COVID’s long-term effects on security

CISOs are looking ahead to see how their security organizations need to work post-COVID. Here's what they expect.

covid 19 coronavirus paper boat in water floating sinking by himmlisch pixabay

CIOs reshape IT priorities in wake of COVID-19

Surfacing from crisis mode, CIOs find themselves redefining IT priorities, thanks to budgets in flux, a rising need to refine business processes, and new outlooks on the future of work.

one lit hanging bulb among many unlit ones

10 tips for a secure browsing experience

Your browser is one of the easiest ways for malware to penetrate your network. Here are 10 ways to practice safe surfing in Google Chrome, Microsoft Edge and Mozilla Firefox.

coronavirus covid 19 pandemic cio technology 5073359 by geralt pixabay cc0 2400x1600

IT’s 10 biggest challenges amid COVID-19

The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

Encryption  >  Encrypted data / hexadecimal code

How close are we to breaking encryption with quantum computing?

Not as close as you might fear, but quantum encryption cracking is on its way. So, it's time to start getting ready for it.

broken lock amid binary code and circuits

Is enterprise security broken?

Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

The trouble with 2fa

With a large percentage of your workforce now working remotely, two-factor authentication (2fa) can make them (or your company data) safer online. But how you're doing it now probably isn't helping much at all.

Detecting phishing attempts  >  A magnifying lens spots a hook trying to catch a fish.

How to protect yourself from coronavirus phishing threats

The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and COVID-19 phishing attacks and five ways to avoid them.

security school education classroom books by chuhail and fstop123 getty

Security School: Enroll today and advance your tech career

Insider Pro and CertsNexus have created a virtual classroom where subscribers can learn and test their cybersecurity readiness.

special report downturn economic by anueing gettyimages 606665834 3x2 2400x1600

Dealing with the downturn

As the coronavirus pandemic builds, businesses are already reeling from the economic impact. Here's how IT can adjust to a new reality of cost trimming and budget cuts.

security threats and vulnerabilities

How to protect remote workers from the coronavirus crime wave

As predicted, the coronavirus crisis is bringing out the worst in cybercriminals. But the attacks are really just old exploits modified to exploit the new coronavirus context. Here’s how to beat them.

young man on video conference coronavirus remote communication telecommuting by gcshutter getty ima

How remote access tools can help your businesses adapt to the coronavirus

Coronavirus has created unprecedented challenges for companies and their employees across the globe and remote access tools are helping them meet them.

Load More
You Might Also Like