Who should CISOs report to? That has been a longstanding question in the IT field, but, as cybersecurity rises to the tops of the business and IT priority ladders, it has taken a on new sense of urgency. Features Writer Jason Sparapani explores the CISO reporting structure in today’s threat-laden digital business environment.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Speaking of cyberthreats, the U.S. government is starting to assess the digital currencies that are associated with the growing number of cybercrimes such as the recent ransomware attacks on big-name news organizations, as well as blockchain, the technology that underpins these currencies. In this week’s Searchlight, Site Editor Fran Sales explains the ransomware attacks in relation to blockchain and discusses the urgent blockchain security questions that are on Congress’ and IT executives’ minds. Also in Searchlight, Apple is considering boosting iCloud encryption, and Amazon wants your face to be the new password.
Cybersecurity is no longer just an IT concern; it’s a business one. But communicating the value of GRC analysis to the board and determining accountability is easier said than done. In this feature, Sales explores the board’s role in managing cybersecurity and supply chain risks.
The Internet of Things (IoT) has arrived, and the enterprise will never be the same again. In this Essential Guide, get strategic best practices for getting your enterprise IoT initiative off the ground, and find out how IoT is impacting several IT disciplines and how IT executives should respond.
But that’s not all we have on IoT. In this SearchCompliance webcast, learn how a lack of focus on IoT security challenges during the design stage could create a number of data protection vulnerabilities.