Problem solve
Get help with specific problems with your technologies, process and projects.
Enterprise information security management
Implementing machine learning to keep Facebook user data safe
Facebook Director of Security Aanchal Gupta shares how the social media giant is implementing machine learning in security to ensure user data is safe on its platform. Continue Reading
Facebook cybersecurity: How the company is building a diverse team
Facebook director of security Aanchal Gupta sounds off on the need for diverse security teams and gives an overview of how the social media giant is working to make it happen. Continue Reading
CIO uses master data management to speed digitalization
IMA Financial Group CIO Michelle Vercellino's effort to clean up, protect and govern the firm's data is an important step in the firm's quest for 'data intelligence.' Continue Reading
-
Top 2018 cybersecurity trends to watch out for
A glance at IT news shows cybersecurity trends remain on companies' radar. At the CIO Boston Summit, Cybereason's Jessica Stanford discussed steps to defend against risk. Continue Reading
Cybersecurity skills gap: Get creative about cyber hiring
Hiring candidates from disciplines beyond infosec can go a long way to address the widening cybersecurity skills gap, says industry veteran Javvad Malik. Continue Reading
Is end user training essential to data loss prevention program success?
Regulations like the GDPR promise to enforce stricter data protection rules. While a data loss prevention program can help, it requires end-user training to ease adoption.Continue Reading
Security practices don't have to hinder IT speed
Speed-to-market strategies shouldn't be bogged down by IT security. Here are two steps that will help CISOs adapt governance practices to support IT speed.Continue Reading
Why aren't there more women in cybersecurity?
Outmoded stereotypes, not enough female execs -- there are many reasons for the low numbers of women in cybersecurity. Most (but not all) are easily fixed.Continue Reading
Quest for the best security for containers: Seven steps
Despite their name, containers are by no means impervious to threats. With their use expected to grow, the time is ripe for determining the best security for containers.Continue Reading
Loose coupling, tight data access minimize security risks of new tech
A recent article on biological malware got Niel Nickolaisen thinking about how to minimize security risks in emerging tech. Here are two approaches that will help.Continue Reading
-
Mitigating security risks posed by emerging tech: Expert advice
Companies are in hot pursuit of the benefits offered by cutting-edge technologies, but mitigating security risks often gets scant attention. CIOs need to change that. Here's how.Continue Reading
Pondering the question of IoT data ownership
As the use cases for the internet of things continue to expand into various sectors and the benefits of analyzing that data collected from IoT grow, the question of IoT data ownership and access privileges is coming to the fore. But we can't simply ...Continue Reading
Security of IoT-enabled devices remains low priority for developers
MIT Sloan cybersecurity expert Stuart Madnick talks about clear and present dangers in an IoT-enabled world.Continue Reading
Stuart Madnick: Dark Web hackers trump good guys in sharing information
Organizations are getting better at defending against cyberattacks, says MIT Sloan's Stuart Madnick, but dark Web hackers maintain an edge. He explains why.Continue Reading
How to handle a data breach: Managing public perception
When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim.Continue Reading