IT Strategy

IT Strategy | News, how-tos, features, reviews, and videos

cloud security / data protection / encryption / security transition
Laura Deaner, CISO, Northwestern Mutual

tc agostino target
video

Security lessons from Target’s business transformation

Minneapolis-based Target Corporation serves guests at nearly 1,900 stores and at Target.com. Of all of the industries impacted severely by the pandemic, retail was one hit most drastically. Yet Target was one of those businesses that...

tc cappelli rockwell
video

Rockwell Automation CISO: Ransomware recovery a nightmare for OT

With 24,000 employees and customers in more than 100 countries, Rockwell Automation is a global leader in industrial automation and digital transformation. As industries rely more and more on operational technology (OT), they can be...

high priority gauge

CISOs’ 15 top strategic priorities for 2021

Mitigating third-party risk, baking security into the development process, defending against ransomware attacks, keeping pace with digital transformation efforts—these are just a few things that are top-of-mind for CISOs today.

spot itleadership cio superhero businessman by yuganov konstantin shutterstock 373650874 2400x1600

Real IT leadership: Selling the transformative dream

It's one thing to cook up a great new initiative, but making it happen requires powers of persuasion, solid partnerships, and access to genuine technical insight.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

8 things CISOs should be thinking about, but probably aren't

CISOs need to cover all the security bases. The problem is, some of the bases are easy to overlook.

cso50 usa awards

CSO50 2021 awards showcase world-class security strategies

Winners will be recognized at the annual CSO50 Conference + Awards taking place November 16-18, 2021.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

7 critical IT policies you should have in place

Putting a framework of IT policies that should be the foundation of every company's security plan.

Tech Spotlight   >   IT Leadership [intro]   >   One glowing arrow leads a pack of other arrows.

What IT leadership looks like in 2021

As IT leaders meet the challenges of the COVID era, only one thing is assured – more change is coming sooner than you think.

IDG Tech Spotlight  >  IT Leadership [ September 2020 ]

IT leaders grapple with the new normal

Five articles examine the challenges faced by leaders across all segments of IT – and the solutions that have made a difference.

CSO Digital Magazine  >  Summer 2020 [cover]

Redefining the CISO role: Why the top security job is gaining C-suite and boardroom status

Breach concerns, data privacy regulations, and a move to separate security from IT are elevating the importance of the security role.

A shield protects against COVID-19 coronavirus-related threats.

What's next? CISOs weigh in on COVID’s long-term effects on security

CISOs are looking ahead to see how their security organizations need to work post-COVID. Here's what they expect.

covid 19 coronavirus paper boat in water floating sinking by himmlisch pixabay

CIOs reshape IT priorities in wake of COVID-19

Surfacing from crisis mode, CIOs find themselves redefining IT priorities, thanks to budgets in flux, a rising need to refine business processes, and new outlooks on the future of work.

one lit hanging bulb among many unlit ones

10 tips for a secure browsing experience

Your browser is one of the easiest ways for malware to penetrate your network. Here are 10 ways to practice safe surfing in Google Chrome, Microsoft Edge and Mozilla Firefox.

coronavirus covid 19 pandemic cio technology 5073359 by geralt pixabay cc0 2400x1600

IT’s 10 biggest challenges amid COVID-19

The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

Encryption  >  Encrypted data / hexadecimal code

How close are we to breaking encryption with quantum computing?

Not as close as you might fear, but quantum encryption cracking is on its way. So, it's time to start getting ready for it.

broken lock amid binary code and circuits

Is enterprise security broken?

Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

The trouble with 2fa

With a large percentage of your workforce now working remotely, two-factor authentication (2fa) can make them (or your company data) safer online. But how you're doing it now probably isn't helping much at all.

Detecting phishing attempts  >  A magnifying lens spots a hook trying to catch a fish.

How to protect yourself from coronavirus phishing threats

The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and COVID-19 phishing attacks and five ways to avoid them.

Load More