IT Leadership

IT leadership and management news, analysis, research, how-to, opinion, and video.

Android Smart Lock Trusted Places

Zero Trust: Why ‘cyber insurance’ offers no GDPR compliance

With the finable GDPR compliance deadline just weeks away, the vultures are circling – and leading the pack is a group of companies touting so-called ‘cyber insurance’. While the majority of IT security vendors are opting to scare...

sepia number 3 film reel top three

The 3 hidden costs of incident response

Every business function seeks to apply finite resources to maximum benefit, and to do that effectively in security, like threats, requires a keen understanding of those costs that are known and those that are hiding.

woman on smartphone city network security leader iot

What is a Chief Security Officer (CSO)? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

vulnerable gdpr breach security cyber attack

Salted Hash Ep 28: GDPR deadline fast approaches

The deadline for the General Data Protection Regulation (GDPR) is almost here. During our trip to the RSA Conference last month, Salted Hash spoke to an expert on the subject, and learned some interesting things when it comes to...

11 regulations

What small business owners should know about GDPR and why

The General Data Protection Regulation (GDPR) goes into force May 25, 2018. Learn what small-business owners need to know about GDPR and why it matters.

11 regulations

Why mid-market companies face a tougher road with the GDPR

The rules and potential penalties of the GDPR will not fit all sized companies.

Will LaSala

Salted Hash Ep 24: Defending against mobile threats

Welcome back! After shooting several episodes during the RSA Conference in San Francisco, this week Salted Hash talks mobile threats with VASCO's Will LaSala. In addition to this week's episode, we've also got some additional footage...

thumbs up positive attitude congratulations happy employees staff

Branding infosec: Why security should consider its own internal advertising campaign

A positivity campaign raised security awareness — and improved performance — at Finning International.

supply chain

DOD releases new guidance to protect data within the supply chain

Companies supplying products and services to the US Department of Defense must meet 110 security requirements specified in NIST SP 800-171 or risk losing contract awards through a new set of risk scoring guidelines. The new rules...

vulnerable gdpr breach security cyber attack

GDPR-defined personal data can be hard to find—here's where to look

The General Data Protection Regulation (GDPR) puts the onus on organizations to better manage and personal data. But do they know where to find it? We list the areas most likely to be overlooked.

businessman with stress headache pain frustration

Going through the 7 stages of GDPR

How to cope with the pain and distress of compliance to the new General Data Protection Regulation (GDPR).

Atlanta skyline

Atlanta's recovery highlights the costly mistake of being unprepared

The Samsam attack against the city of Atlanta in March was chaotic and crippling. The ransomware, named for the group responsible for development and deployment, left the city scrambling to deal with critical systems that were forced...

security threats and vulnerabilities

5 signs you've been hit with an advanced persistent threat (APT)

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack

data security encryption

Why data governance should be corporate policy

Data is like water, and water is a fundamental resource for life, so data an essential resource for the business. Data governance ensures this resource is protected and managed correctly enabling us to meet our customer's expectations....

vulnerable gdpr breach security cyber attack

GDPR compliance in a nutshell

Time to figure out how to manage your enterprise's compliance with the General Data Protection Regulation (GDPR).

rsa conference 2017

Quick take-aways from the RSA Security Conference

Last week's RSA Security Conference had good discussions and industry focus, but there was too much hype -- and there's lots of work ahead.

European Union, EU

General Data Protection Regulation (GDPR) requirements, deadlines and facts

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

Dana Deasy

The Top 3 cyber priorities for DOD’s incoming CIO

The DOD’s new top IT executive Dana Deasy will be an important cog in DOD’s big push toward universal defense cloud adoption, facilitating organizational changes that will make the military’s cyber defense more streamlined and...

security incident responders life preservers

Two incident response phases most organizations get wrong

It's important to remember: Incident response isn't a thing, it's a process.

recruiting thinkstock

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

Load More