By Jamie Cutler, CIO, QEP Resources
By Gilad Raz, Chief Information Officer, Varonis
By Neil Jarvis, CIO, Fujitsu America, Inc.
By Ann M. Beauchesne, SVP, National Security & Emergency Preparedness, U.S. Chamber of Commerce
By Jackson Shaw, Senior Director, Product Management, Dell
Everyone’s talking about the Internet of Things that infinite network of physical objects that collect and transmit data autonomously.
By Jon Gelsey, CEO, Auth0
Auth0 simplifies identity implementation and management, making it easy for developers to implement even the most complex identity solutions for their web, mobile and internal applications,
By Bob Fecteau, CIO, SAIC
Hype vs. Reality Cyber security is no doubt a significant global challenge, but I question whether we are expecting too much from our IT professionals and if we are giving them proper
By Arturo Perez-Reyes, SVP Cyber and Technology, HUB International
Large enterprises like Target, Sony and Home Depot may have grabbed headlines for recent cyber attacks, but small to mid-size businesses are the most exposed and the easiest prey.
By Roota Almeida, CISO, Delta Dental of New Jersey
Cyber Insurance and the Threat Landscape:In the recent years, the threat landscape has significantly changed and will continue to do so.
By James Carder, CISO & VP of LogRhythm Labs
The threat landscape hasn’t really changed except for a few minor adjustments. We are still seeing nation state threat actors, financial crime
By Joan Pepin, VP of Security, CISO, Sumo Logic
I believe the most important foundational thing CISOs and security professionals can do is to understand the expectations of the CEO, board, executive staff and peers or employees.
By Clinton Karr, Sr. Security Strategist, Bromium
The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data.
By Bruce Valk, CIO & VP, Silver Star Brands
Growing up as a barber’s son in a small rural Wisconsin town, I was unknowingly an early student of emotional intelligence as I listened to and observed the diverse clientele.
By Bret Arsenault, VP & CISO, Microsoft Corporation
Without a clear understanding of your security business and how it relates to the rest of your company, there is a risk of resource overcompensation in trying to mitigate cyber security threats.
By Mark Combs, CISO, WVU Healthcare
If government enforced penalties are really effective, then why are we still seeing breaches of sensitive information?
By Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab
Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever the same.
By Michael Corn, Deputy CIO & CISO, Brandeis University
University networks have long been viewed as poor models for information security. However in practice many of the challenges facing these networks (broad adoption of consumer-grade services and BYOD for example) are increasingly challenging corporate networks.
By Elizabeth Hackenson, CIO and SVP of Global Business Services, AES
Information security is a broad challenge facing most businesses today and while given significant attention in recent years, it has intensified in the last 18 months.
By Phil Agcaoili, SVP & CISO, Elavon
In our now hyper interconnected world, critical lifeline services have been connected to the Internet. These lifeline services affect nearly every part of our lives and impact our economic livelihood, our public health and safety, and our national security.
By Sherry Ryan, VP & CISO, Juniper Networks
Before moving to any cloud environment, be sure that you really understand the vendor’s security strategy, resources, and SLA’s.
By Alma Cole, VP-Cyber Security, Robbins Gioia
At first feared by CIOs and security professionals alike