By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Cybersecurity strategy News
April 18, 2017
Innovative mobile security technology has been developed to offset vulnerabilities, but using cutting-edge solutions such as automation could come back to haunt IT execs.
March 31, 2017
Rollback of FCC privacy rules on selling personal data is seen as a boon for ISPs and a blow to privacy rights. But the issue is complicated. What are the implications for CIOs?
January 13, 2017
Consumer privacy took center stage at Federal Trade Commission's PrivacyCon event held in Washington D.C. on Thursday. Senior Executive Editor, Linda Tucci explores how advancements in technology ...
December 16, 2016
This week, Yahoo revealed that more than 1 billion accounts were compromised in a breach that took place in 2013. In Searchlight, Senior Executive Editor Linda Tucci spoke with experts to find out ...
Cybersecurity strategy Get Started
Bring yourself up to speed with our introductory content
Managing mobile devices just keeps getting harder. Devices and apps are proliferating. Every data breach seems to prompt new rules. We lay out the problem and a plan. Continue Reading
As hackers grab headlines, CISO jobs get hot. Now cloud providers are looking for a nuanced brand of IT talent. Continue Reading
The big guys already have one -- now smaller cloud service vendors are hiring a cloud-specific security exec to focus on security. Continue Reading
Evaluate Cybersecurity strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Protecting the mobile enterprise while allowing for the many business benefits mobility provides has never been more challenging. Read how these IT leaders are making mobile work. Continue Reading
In this Essential Guide, learn how to deal with increasing cyberthreats and discover best practices for developing a successful IT security strategy. Continue Reading
Insufficient email data security remains a gaping cybersecurity concern for the public and private sector, according to the former CIO of U.S. Customs and Border Protection. Continue Reading
Manage Cybersecurity strategy
Learn to apply best practices and optimize your operations.
In this video, state of Wisconsin CIO David Cagigal and CISO Bill Nash offer pointers on how a strategic CIO-CISO partnership can help drive and prioritize cybersecurity. Continue Reading
The fraud investigation process remains complicated for companies, but graph databases' information management techniques can help collect and manage valuable evidentiary data. Continue Reading
As companies struggle to protect constantly expanding attack surfaces, virtual containers could quickly become essential to companies' endpoint security strategy. Continue Reading
Problem Solve Cybersecurity strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Why nation-state attribution plays a major role in the U.S. government's willingness to share cyberthreat intelligence with private-sector companies. Continue Reading
In this CIO Minute video, CTO Niel Nickolaisen shares his thoughts on mitigating mobile security risks. Identifying the sources of risk is just the first step. Continue Reading
As the use cases for the internet of things continue to expand into various sectors and the benefits of analyzing that data collected from IoT grow, the question of IoT data ownership and access privileges is coming to the fore. But we can't simply ... Continue Reading