HP gets intentional about contracting with Black IT providers
HP CIO Ron Guerrier is working to diversify IT’s suppliers and boost the benefits they get from working with HP to build a more representative technology workforce.
View ArticleTop 10 business needs driving IT spending today
Security and efficiency directives are fueling a shift in IT spending toward foundational business requirements to position organisations for uncertain future.
View ArticleEquifax’s Jamil Farshchi: Security shouldn’t be a trade secret
Farshchi joined the credit reporting agency in 2018 with a mandate for change following the company’s high-profile data breach.
View ArticleLocked in: How long is too long for security vendor contracts?
Stephanie Benoit Kurtz thought she had a good deal when, in one of her former CISO roles, she signed a three-year contract with a vendor for vulnerability management.
View ArticleCIOs share 6 most overhyped technologies in IT
IT leaders are not immune to infatuation with the promise of emerging tech. Here, CIOs share which technologies they believe are primed to underdeliver.
View ArticleCollaboration is crucial to balance customer experience with security, privacy
Security and privacy teams working with sales, marketing and design ensures a good user experience while protecting data and maintaining regulatory compliance.
View ArticleWhat IT will look like in 2025
Forward-thinking CIOs are mapping out three-year plans that anticipate newly mainstreamed tech, blended teams and democratised IT.
View ArticleHow legacy tech impedes zero trust and what to do about it
Old perimeter-based defences can throw up roadblocks to implementing a zero trust strategy, but a measured, phased approach will see you through.
View ArticleEight hallmarks of a proactive security strategy
More CISOs are balancing their response and recovery capabilities with proactive measures that anticipate attacks and vulnerabilities.
View ArticleHow to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready
Getting ready for one of the most demanding review processes in cybersecurity can be daunting, but experts say preparing for a SOC 2 audit can be an important part of a well-managed year-round security...
View Article5 ways businesses can avoid IT purchasing regrets
When asked about technology purchase regrets, veteran tech exec Sanjay Macwan digs deep for a classic hyped technology that has yet to pan out: smart glasses.
View ArticleWhy reporting an incident only makes the cybersecurity community stronger
CISOs and cyber leaders may not see reporting a breach as the most pleasant of tasks, but experts say mandatory and voluntary sharing of intelligence around incidents can only improve the readiness and...
View ArticleEvil digital twins and other risks: opening a host of new security concerns
Digital twins are incredibly useful tools for a range of industries. But they also come with intrinsic risk factors and could create new avenues for attacks unless security is involved when they’re...
View ArticleShadow IT is increasing and so are the associated security risks
Shadow IT — tech brought into an organisation without the security team’s knowledge — continues to be a threat. Managing visibility through increased vigilance and employee education can help mitigate...
View ArticleTo solve the cybersecurity worker gap, forget the job title and search for...
CISOs who focus on identifying job candidates with the skills they need are finding talent from other fields and functions to help them get their cybersecurity work done.
View Article
More Pages to Explore .....