Security

Security | News, how-tos, features, reviews, and videos

okta podcast series megaphone
Sponsor Podcast Okta

Episode 1: Introduction to CIAM and Why It’s Important

Episode 1: Why a strong CIAM approach is essential to keeping your customers happy

agile jump gap bridge the gap risk management by blake cheek unsplash

Knowing where the line is in IT risk management

Not all risk is a raging fire. Technology projects should be weighed against your organization’s broader risk appetite.

gavel justice judicial system law lawyer judge bureaucracy governance compliance

Data governance: A best practices framework for managing data assets

Data governance defines roles, responsibilities, and processes for ensuring accountability for and ownership of data assets across the enterprise.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Cybersecurity in 2021: Stopping the madness

The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.

Tech Spotlight   >   Cybersecurity [CIO]   >   A brilliant, glowing lightbulb shatters.

Mitigating the hidden risks of digital transformation

New, cross-discipline risk management techniques are necessary to securely reap the benefits of transformative technologies.

group of executives collaborate board room board mentor advisory board colleagues networking by alp

Money for nothing: Making sense of data collaborations in healthcare

The monetization of healthcare data has been a long-pursued goal for tech firms and healthcare enterprises. Newly formed data collaboratives are taking a fresh approach.

The open jaws of a spring trap lie in wait. [danger / risk]

When emotions run high: Protecting your network infrastructure from reputational attacks

In today’s environment, where one angry tweet can go viral, CISOs play a critical role in protecting the brand.

A protective face mask site on a laptop displaying models of viral cells.

7 ways COVID-19 has changed IT forever

Things will never be the same. Here’s a look at what IT will look like as the COVID-19 threat recedes.

A virtual sphere of photos of individuals appears against a cityscape.

Security job candidate background checks: What you can and can't do

Enterprise cybersecurity begins with a trustworthy staff. Here's how to ensure that current and prospective team members aren't hiding any skeletons.

audit binary compliance magnifying glass investigate

5 ways to combat audit fatigue

The growing number of audits for security and privacy regulatory compliance is stressing security personnel and draining resources from security operations. Here's how to better manage them.

risk assessment gauge

The big debate: control compliance vs. risk management

Industry-standard security frameworks are important, but they also need to align with the rest of your organization's risk management practices.

Tech Spotlight   >   The Future of Work [Overview]   >   A crystal ball for peering into the future.

The future of work: Coming sooner than you think

What will your worklife be like years from now? Today's work-from-home world has given us a glimpse of the future, as these five articles from CIO, Computerworld, CSO, InfoWorld, and Network World illustrate.

Tech Spotlight   >   The Future of Work [CIO]   >  Business leaders / question mark overlay

7 key questions facing the future of work

A global pandemic raised the bar for IT’s capabilities. IT leaders say 2021 will be even more challenging.

team trust risk gap help assistance challenge

Risk, the misunderstood discipline

Knowing the difference between risk appetite, tolerance, and threshold enables better decision making about technology investments to drive the business forward.

abstract data analytics

How DMaaS eliminates data silos and 4 tips for choosing a provider

For CIOs caught in an ever-growing web of complicated data silos, data management as a service can help drive a competitive business advantage.

Cybersecurity  >  Email security threats, such as phishing

At CES, a new era of hardware addresses the work-from-home shift

At CES 2021, Dell, HP, and Lenovo, the three largest PC vendors, all unveiled a spate of new business laptops with security enhancements like hardened protection and built-in smarts to guard against ransomware, crypto-mining, and...

Multiple-exposure image of a businessman's silhouette against an image of him climbing a mountain.

Top 8 challenges IT leaders will face in 2021

Facilitating the future of work and securing a hybrid working environment top the list of tough, pandemic-inflected issues IT leaders must navigate this year.

Cybersecurity  >  Skull + crossbones / abstract code / criminal hacker / attack / security threat

From risk mitigation to business enabler: The role of CISOs in 2021

CISOs faced a number of challenges in 2020, not the least of which was COVID-19 and the mass migration from onsite to remote work. Corporate leadership saw just how vital the security team is to ensuring the company runs, and runs...

sparkler celebrate party new year

9 IT resolutions for 2021

IT leaders share their visions on how they hope to transform their teams, their organizations, and themselves in the new year.

Shaking hands

Perfect strangers: How CIOs and CISOs can get along

The rise of security as a strategic imperative has altered the relationship between IT and infosec leaders. Here’s how CIOs and CISOs can become better partners.

Load More