Manage
Learn to apply best practices and optimize your operations.
Enterprise information security management
Blockchain tutorial for CIOs
Blockchain, a distributed ledger technology, promises to change how business is done. Learn about the whats, whys and hows of this new technology in our CIO blockchain tutorial. Continue Reading
The future of data security threats and protection in the enterprise
The future of data security faces new threats at an ever-increasing rate. Read one expert's advice on having a data security strategy to assess and manage enterprise data security. Continue Reading
Staring down cybersecurity risks in the digital organization
For cybersecurity strategies to be successful, digitized companies must find the balance between the benefits and risks that come with rapidly advancing IT innovation. Continue Reading
-
Technology risks: What CIOs should know and steps they can take
Adopting new tech helps businesses thrive, but CIOs must be aware of accompanying risks. Experts sound off on how new tech continues to muddle the cybersecurity threat landscape. Continue Reading
Cybersecurity education: North Dakota preps future workforce
North Dakota's CIO is behind a cybersecurity education program that aims to get the state's students up to speed on the essentials of IT security. Continue Reading
McAfee CISO: The importance of a strong cybersecurity culture
For McAfee CISO Grant Bourzikas, building a strong cyberdefense culture is essential because employees are the first line of defense to avoid rapidly evolving cybersecurity risks.Continue Reading
McAfee CISO: Leadership buy-in essential to boost cybersecurity
As online risks continue to evolve, making sure company leadership buys in to efforts to improve cybersecurity posture has become essential, says McAfee CISO Grant Bourzikas.Continue Reading
CIO roles: Developing 'safe and sound' IT systems
Digital transformation is having a big influence on the evolution of the CIO role. For one CIO, responsibilities have expanded into ensuring the 'safety and soundness' of IT systems.Continue Reading
How can companies protect against ransomware in the cloud?
When it comes to ransomware attacks, cloud storage is not foolproof. CyberSight's Hyder Rabbani offers tips about how to address cloud ransomware threats.Continue Reading
CISO soft skills in demand as position evolves into leadership role
Cybersecurity industry veteran Joan Pepin discusses how the evolution of the CISO role has made soft skills essential to thrive in the information security field.Continue Reading
-
CISO: Data integrity and confidentiality are 'pillars' of cybersecurity
When it comes to protecting online info, one cybersecurity veteran says the role of a CISO is to first incorporate processes that maintain data integrity and confidentiality.Continue Reading
Informatica enlists cloud workload protection platform for 'zero-trust' IT security
To secure its immense cloud operations, Informatica looks to a new tool, a cloud workload protection platform by Aporeto, with a deny-all approach to server access.Continue Reading
Webcast: Incorporating log data analysis with incident management
Log data analysis has evolved in recent years and can prove invaluable to security incident management. Jeffrey Ritter presents a webcast showcasing this evolution.Continue Reading
Cybersecurity's shortage of skills leaves IT projects vulnerable
A recent study found that as IT projects proliferate, cybersecurity's shortage of skills is leaving tech vulnerable. Analyst and study author Jon Oltsik explains in this Q&A.Continue Reading
How to prep for the GDPR breach notification rule
As companies prep for GDPR compliance, its breach notification rule is making waves. Csaba Krasznay, security evangelist at Balabit, discusses how to prep for Article 33 of GDPR.Continue Reading