Features
Features
Risk and compliance strategies and best practices
-
New tech creates new attack vectors, cybersecurity vulnerabilities
CISO John Germain explains how tech like AI and IoT are revolutionizing business -- and creating new cybersecurity vulnerabilities as data protection is left on the back burner. Continue Reading
-
Tech, growing data sets complicate enterprise cybersecurity strategy
Emerging tech has grown companies' data sets and made IT environments increasingly complex. As IT capabilities evolve, enterprise cybersecurity strategy is struggling to keep up. Continue Reading
-
Why aren't there more women in cybersecurity?
Outmoded stereotypes, not enough female execs -- there are many reasons for the low numbers of women in cybersecurity. Most (but not all) are easily fixed. Continue Reading
-
'Regulated enablement' key to minimizing shadow IT risk
Shadow IT risk continues to plague companies, but some are finding ways to allow citizen developers to use these unsanctioned applications -- with certain restrictions. Continue Reading
-
Mitigating security risks posed by emerging tech: Expert advice
Companies are in hot pursuit of the benefits offered by cutting-edge technologies, but mitigating security risks often gets scant attention. CIOs need to change that. Here's how. Continue Reading
-
Social cybersecurity: Influence people, make friends and keep them safe
Jason Hong talks about Carnegie Mellon's work in social cybersecurity, a new discipline that uses techniques from social psychology to improve our ability to be secure online. Continue Reading
-
CISO: To achieve security in IoT devices, remember the fundamentals
Connectivity has created new threat landscapes, but iRobot CISO Ravi Thatavarthy says it's important to remember fundamental IT security principles when it comes to security in IoT devices. Continue Reading
-
Machine learning in cybersecurity moves needle, doesn't negate threats
The deployment of machine learning in cybersecurity is helping CIOs reduce false positives, quicken response times and make IS staff more efficient. But it's no magic bullet. Continue Reading
-
New cloud security job calls for skills new and old
As hackers grab headlines, CISO jobs get hot. Now cloud providers are looking for a nuanced brand of IT talent. Continue Reading
-
Cloud provider security in spotlight, gives rise to new role
The big guys already have one -- now smaller cloud service vendors are hiring a cloud-specific security exec to focus on security. Continue Reading
-
Supporting and protecting the mobile enterprise: Think big
Protecting the mobile enterprise while allowing for the many business benefits mobility provides has never been more challenging. Read how these IT leaders are making mobile work. Continue Reading
-
For CIOs, email data security should still be a top priority
Insufficient email data security remains a gaping cybersecurity concern for the public and private sector, according to the former CIO of U.S. Customs and Border Protection. Continue Reading
-
Blockchain use cases, private vs. public debate engross community
The blockchain industry is hashing out how to determine a good blockchain use case, debating the usefulness of private blockchains and mapping out how regulators might benefit. Continue Reading
-
What is a smart contract and what's it good for?
Blockchain-based smart contracts promise to improve upon traditional legal contracts by validating conditions of a contract and enforcing outcomes through code. Continue Reading
-
Digital security puts CISO reporting structure in corporate glare
The longstanding question of whom CISOs should report to has taken on new urgency as digital security rises to the top of corporate agendas. Continue Reading