IT Leadership

IT Leadership | News, how-tos, features, reviews, and videos

annalea llg flexential
Q&A

CSO Spotlight: Annalea Ilg, Flexential

The cybersecurity threat is ever growing and its clear companies are still not following basic security practices. If they were, we wouldn’t be seeing so many breach notifications, says Ilg.

board ceo executives table

Top reasons CEOs should care about privacy

Privacy protection will undoubtedly be one of the defining issues of the internet age, and it’s important for leaders and companies to take notice and actively prevent breaches and protect their customers.

Lego wall breakthrough

Does DevSecOps eliminate the segregation of duties between security and DevOps?

Yes, some cloud-native application development tools include basic security features. No, that does not mean DevOps should “own” security.

piggy bank on top of a calculator

Making the case for security spend

How to gain management and customer support in security investments.

eddie garcia cloudera
Q&A

CSO Spotlight: Eddie Garcia, Cloudera

For Eddie Garcia, job satisfaction comes from “[seeing his] contributions help organizations securely process data for good.” His best advice for aspiring security leaders is to focus on your passion and let the rest fall into place —...

orange number 5 pool ball top five 5 tips

5 simple steps for SMBs to ensure cyber resiliency

While these tips are by no means a complete guide for how SMBs can be resilient, they can be the start of a continuous process small and mid-sized business should implement to be better prepared.

nuclear power plant

The Three Mile Island event and cybersecurity incident response

Managing the deluge of data and alerts in a SOC can be challenging for any size organization. Observing the lessons learned from the Three Mile Island nuclear facility can help drive home some best practices for how to avoid common...

david cook databricks
Q&A

CSO Spotlight: David Cook, Databricks

For Cook, the best trend in cybersecurity right now is the use of artificial intelligence and machine learning because, he says, "security is about spotting patterns, and new services based on machine learning can help analysts spot...

11 support boardroom

Security metrics you need for the board

No one wants to show up to an important meeting empty-handed. But with so many analytics right at their fingertips, how can CSOs pick the right numbers to reflect their work? Here are three imperative metrics to have in your...

leading digital transformation puppet

Leveraging digital transformation

Data protection plays a key part in digital transformation adoptions, changes to existing practices and reforming company culture. Digital transformation expert Vic Tingler discusses how businesses can digitally transform to increase...

boardroom job opening executive in silhouette empty chair new job

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness.

justin somaini sap
Q&A

CSO Spotlight: Justin Somaini, SAP

Perhaps controversially, Somaini doesn't believe that cybersecurity is constantly changing. For him, all you need is all you've ever needed: a solid grasp on security theory and a comprehensive understanding of technology trends.

Define your organization's culture

Instilling a security-driven culture, from Chicken Little to the Hot Stove Syndrome

It’s 2018, so there’s practically a new breach, vulnerability or some other security-related emergency in the news daily. Given the stakes and risks, you’d think that driving a culture of security and fraud awareness would be...

grant bourzikas mcafee
Q&A

CSO Spotlight: Grant Bourzikas, McAfee

The skills shortage is real, is likely bigger than most estimates suggest, and isn't just about the sheer numbers of people, says Bourzikas. His advice for aspiring IT leaders: emphasize and encourage diversity of thought on your...

Conceptual images of a woman listening to a stream of abstract letters.

How to turn cyber babble into a language we all speak

In today’s digital age, assuming everyone speaks the same language will leave everyone frustrated and babbling, including you.

digital brain connected to circuits

The art of machine speed execution

Understaffed security teams are struggling to secure their organizations’ expanding technology footprints, and often times the new tools they have been given to manage data bring with them a tidal wave of new data to sift through. In...

postman rubber post elastic office 646631

What should a cyber-resilient business look like?

Cyber resiliency and the value it brings to a company and its customers will depend on how well the business incorporates its security program as a strategic partner.

security

RSA 2018 conference recap

Memories from the greatest information security show on earth.

sepia number 3 film reel top three

The 3 hidden costs of incident response

Every business function seeks to apply finite resources to maximum benefit, and to do that effectively in security, like threats, requires a keen understanding of those costs that are known and those that are hiding.

woman on smartphone city network security leader iot

What is a Chief Security Officer (CSO)? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

Load More