IT Leadership

IT Leadership | News, how-tos, features, reviews, and videos

annalea llg flexential
Q&A

CSO Spotlight: Annalea Ilg, Flexential

The cybersecurity threat is ever growing and its clear companies are still not following basic security practices. If they were, we wouldn’t be seeing so many breach notifications, says Ilg.

board ceo executives table

Top reasons CEOs should care about privacy

Privacy protection will undoubtedly be one of the defining issues of the internet age, and it’s important for leaders and companies to take notice and actively prevent breaches and protect their customers.

Lego wall breakthrough

Does DevSecOps eliminate the segregation of duties between security and DevOps?

Yes, some cloud-native application development tools include basic security features. No, that does not mean DevOps should “own” security.

piggy bank on top of a calculator

Making the case for security spend

How to gain management and customer support in security investments.

eddie garcia cloudera
Q&A

CSO Spotlight: Eddie Garcia, Cloudera

For Eddie Garcia, job satisfaction comes from “[seeing his] contributions help organizations securely process data for good.” His best advice for aspiring security leaders is to focus on your passion and let the rest fall into place —...

orange number 5 pool ball top five 5 tips

5 simple steps for SMBs to ensure cyber resiliency

While these tips are by no means a complete guide for how SMBs can be resilient, they can be the start of a continuous process small and mid-sized business should implement to be better prepared.

security audit word cloud

Review: How InSpec 2.0 delivers comprehensive compliance

The InSpec 2.0 platform from Chef tackles compliance head-on, tailored to the specific rules and guidelines that a company wants or needs. It is designed to both make sense of regulatory and technical guidelines and ensure that a...

question marks pavement

What does GDPR mean for an organization's hybrid IT strategy?

Effective May 25th, GDPR set off a wave of privacy updates that forced organizations to reevaluate their IT strategies. Without the right approach, your business will be impacted.

struggle to cultivate digital primary2

It was 35 days to GDPR, and a lot of sleepless nights

GDPR went live on May 25, 2018. A month before the implementation date, attendees at the RSA Conference struggled with being fully ready.

gdpr

GDP…Argh!

Personal data has become a commodity to be collected, bought, sold and traded without user consent. GDPR aims to change that.

nuclear power plant

The Three Mile Island event and cybersecurity incident response

Managing the deluge of data and alerts in a SOC can be challenging for any size organization. Observing the lessons learned from the Three Mile Island nuclear facility can help drive home some best practices for how to avoid common...

david cook databricks
Q&A

CSO Spotlight: David Cook, Databricks

For Cook, the best trend in cybersecurity right now is the use of artificial intelligence and machine learning because, he says, "security is about spotting patterns, and new services based on machine learning can help analysts spot...

11 support boardroom

Security metrics you need for the board

No one wants to show up to an important meeting empty-handed. But with so many analytics right at their fingertips, how can CSOs pick the right numbers to reflect their work? Here are three imperative metrics to have in your...

orange monitors with lock icon network security cyber threat

GDPR: Where we were…and where we’re going

It’s clear that conventional methods to data security aren’t working anymore, so it’s time to step away from breach prevention and focus on a “secure breach” approach.

leading digital transformation puppet

Leveraging digital transformation

Data protection plays a key part in digital transformation adoptions, changes to existing practices and reforming company culture. Digital transformation expert Vic Tingler discusses how businesses can digitally transform to increase...

boardroom job opening executive in silhouette empty chair new job

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness.

rules procedures manuals one way signs

GDPR is live! – Now what?

GDPR rules are a hot mess. Get clarity by further identifying all your GDPR weak spots.

justin somaini sap
Q&A

CSO Spotlight: Justin Somaini, SAP

Perhaps controversially, Somaini doesn't believe that cybersecurity is constantly changing. For him, all you need is all you've ever needed: a solid grasp on security theory and a comprehensive understanding of technology trends.

multiple-exposure image - a businessman, a team at a laptop, and data connections against a skyline

Third-party risk: it’s the second hop you should fear

Third-party risk is a persistent fear for CISOs and risk compliance officers especially, with GDPR potentially piercing corporate non-disclosure agreements. Loss of sensitive data from a third party is often managed using protective...

Define your organization's culture

Instilling a security-driven culture, from Chicken Little to the Hot Stove Syndrome

It’s 2018, so there’s practically a new breach, vulnerability or some other security-related emergency in the news daily. Given the stakes and risks, you’d think that driving a culture of security and fraud awareness would be...

Load More