IT Leadership

IT Leadership | News, how-tos, features, reviews, and videos

binary neural network - artificial intelligence - machine learning
red padlock cybersecurity threat ransomeware

gdpr

The unintended consequences of GDPR

This is not what the regulators had in mind. Business leaders, ignore at your own peril.

man walking garage

Baby steps: building a cybersecurity strategy

Building a cyber strategy can be overwhelming unless you start with large goals broken down into smaller milestones.

niall browne domo
Q&A

CSO Spotlight: Niall Browne, Domo

For Browne, the most important aspect of the CISO's job is understanding that the two most important people in information security are the customer and the hacker.

ocean surf millimeter wave wireless technology sound waves abstract audio graphic

The rolling tide that is GDPR … say hello to the CCPA

Think you dodged the GDPR bullet because you’re not in Europe? Guess again. California just brought that home for millions of businesses.

locked door with key

How pervasive is the insider threat in your company?

The Dtex 2018 Threat Report finds that 100 percent of companies have blind spots when it comes to the insider threat.

california on map of western usa 97656788

Is California’s Consumer Privacy Act of 2018 going to be GDPR version 2?

Discussing the California Consumer Privacy Act of 2018, which covers businesses that collect or sell information about California residents. Some view it as the General Data Protection Regulation 2.0.

nasrin rezai general electric
Q&A

CSO Spotlight: Nasrin Rexai, General Electric

The first female CISO at GE, Nasrin Rexai, stresses how important it is to know who you are, to lead according to your value system, and to think before your respond.

audit binary compliance magnifying glass investigate

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

template c100.00 00 08 04.still001
video

How to pick the best project management methodology for success

Choosing the right project management methodology for the job is essential. Our guide to evaluating project management methodologies will ensure you pick the perfect fit for your next project.

CSO Spotlight Q&A > Tracy Reinhold, Everbridge
Q&A

CSO Spotlight: Tracy Reinhold, Everbridge

How a successful career in the FBI along with the events of 9/11 put Tracy Reinhold on the path to a career in cybersecurity.

executive superimposed on buildings leadership

What makes CISOs successful?

Leadership and communication skills top the list of what's needed to succeed as a chief information security officer (CISO), while technical skills aren’t nearly as important.

multi tasking running executive race speed internet mobile laptop

Hack like a CISO

Developing the security officers' processes, strategies and techniques for managing their time, resources and teams.

sad angry unhappy frustrated hands holding sign andre hunter 350301 unsplash

Lack of confidence in data security can cost you more than you think

The majority of companies don’t understand the value of their data, because they aren’t taking the necessary steps to study the information they are gathering from customers.

scary evil man with hood in the dark 100696889

HTML5: a devil in disguise

HTML5 is not the security safe haven it was once thought to be.

eye binary IDS Intrusion Detection System

Cybersecurity operations: Don't wait for the alert

An SOC is a useful part of our cybersecurity arsenal, but its main benefit will be in helping to minimize damage from an issue that has already happened. A strong investigative team, on the other hand, can help to identify and resolve...

justin berman zenefits
Q&A

CSO Spotlight: Justin Berman, Zenefits

Being wrong is good, embrace it, learn from it and grow from it, advises Berman. Being an effective security leader is about recognizing that "your job is to get the best answer, not to have it."

service management

IT service management: security’s best friend

Your IT service management (ITSM) teams can serve up good security practices with your help.

gdpr

GDPR: Where are we now?

GDPR became the law of the land in Europe on May 25th. The impact has been felt across the globe...

Load More