IT Leadership | News, how-tos, features, reviews, and videos
Shadow IT — tech brought into an organization without the security team’s knowledge — continues to be a threat. Managing visibility through increased vigilance and employee education can help mitigate its dangers.
Will Joe Sullivan’s conviction for obstruction in the reporting of the 2016 Uber privacy breach send a chill through the cybersecurity profession? Sullivan tells CSOs he’s worried it just might.
Sanjit Ganguli, Nathan Howe, and Daniel Ballmer help CXOs clarify the confusion around zero trust in their new book: “Seven Questions Every CXO Must Ask About Zero Trust.” Let’s peek into what you’ll find in their executive&rs
CISOs and other security practitioners can sometimes see things from a negative perspective, which is understandable given the nature of the job. But correcting how we see the role of cybersecurity can lead to much more positive outcomes.
Identity Security based on intelligent privilege controls provides organizations with the added advantage of long-term durability, adaptability, and recoverability in the face of potential attacks.
Managing multiple security vendors is proving to be a significant challenge for organizations, leading to difficulties in integration, visibility, and control. Recent surveys and reports have identified numerous problems associated with managing an a
A new article on how automation can level the playing field in an increasingly risky, post-pandemic environment.
If you think cybersecurity is recession-proof, think again. The time is now to trim waste and streamline risk management.