Quantcast
Channel: ARN - Stories by Mary K. Pratt RSS feed
Browsing latest articles
Browse All 79 View Live

HP gets intentional about contracting with Black IT providers

HP CIO Ron Guerrier is working to diversify IT’s suppliers and boost the benefits they get from working with HP to build a more representative technology workforce.

View Article



Top 10 business needs driving IT spending today

Security and efficiency directives are fueling a shift in IT spending toward foundational business requirements to position organisations for uncertain future.

View Article

Equifax’s Jamil Farshchi: Security shouldn’t be a trade secret

Farshchi joined the credit reporting agency in 2018 with a mandate for change following the company’s high-profile data breach.

View Article

Locked in: How long is too long for security vendor contracts?

Stephanie Benoit Kurtz thought she had a good deal when, in one of her former CISO roles, she signed a three-year contract with a vendor for vulnerability management.

View Article

CIOs share 6 most overhyped technologies in IT

IT leaders are not immune to infatuation with the promise of emerging tech. Here, CIOs share which technologies they believe are primed to underdeliver.

View Article


Collaboration is crucial to balance customer experience with security, privacy

Security and privacy teams working with sales, marketing and design ensures a good user experience while protecting data and maintaining regulatory compliance.

View Article

What IT will look like in 2025

Forward-thinking CIOs are mapping out three-year plans that anticipate newly mainstreamed tech, blended teams and democratised IT.

View Article

How legacy tech impedes zero trust and what to do about it

Old perimeter-based defences can throw up roadblocks to implementing a zero trust strategy, but a measured, phased approach will see you through.

View Article


Eight hallmarks of a proactive security strategy

More CISOs are balancing their response and recovery capabilities with proactive measures that anticipate attacks and vulnerabilities.

View Article


How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready

Getting ready for one of the most demanding review processes in cybersecurity can be daunting, but experts say preparing for a SOC 2 audit can be an important part of a well-managed year-round security...

View Article

5 ways businesses can avoid IT purchasing regrets

When asked about technology purchase regrets, veteran tech exec Sanjay Macwan digs deep for a classic hyped technology that has yet to pan out: smart glasses.

View Article

Why reporting an incident only makes the cybersecurity community stronger

CISOs and cyber leaders may not see reporting a breach as the most pleasant of tasks, but experts say mandatory and voluntary sharing of intelligence around incidents can only improve the readiness and...

View Article

Evil digital twins and other risks: opening a host of new security concerns

Digital twins are incredibly useful tools for a range of industries. But they also come with intrinsic risk factors and could create new avenues for attacks unless security is involved when they’re...

View Article


Shadow IT is increasing and so are the associated security risks

Shadow IT — tech brought into an organisation without the security team’s knowledge — continues to be a threat. Managing visibility through increased vigilance and employee education can help mitigate...

View Article

To solve the cybersecurity worker gap, forget the job title and search for...

CISOs who focus on identifying job candidates with the skills they need are finding talent from other fields and functions to help them get their cybersecurity work done.

View Article

Browsing latest articles
Browse All 79 View Live




Latest Images