9 Posts

Charles Kolodgy

Senior Security Strategist, IBM

Charles Kolodgy is a Senior Security Strategist with IBM Security. He has been involved in the IT Security field for over 30 years. His views and understanding of IT security were initially shaped during 16 years at the National Security Agency where he held a variety of analyst and managerial positions within both information assurance and signals intelligence organizations. He then moved to IDC, and as a security market analyst executed primary research projects, built security market forecasts, and identified market trends. At IBM Security, Charles drives portfolio strategy for targeted market categories, and creates and delivers security point-of-views to customers, analysts and internal IBM teams.

Written By Charles Kolodgy

Cybersecurity Strategy, Risk Management and List Making

A framework such as the NIST CSF can help security professionals determine where to start when developing a cybersecurity strategy.

In Search of Equilibrium: Compliance and Security

When properly aligned with business goals, compliance and security work in concert as part of a holistic, integrated system.

Social Engineering and the Stranded Sports Fan

Visitors to the upcoming sporting event in Rio de Janeiro should be on high alert for the stranded traveler social engineering scam.

The Next Big Thing: Who Drives the Security Agenda?

Cybercriminals may be the ones setting the security agenda, but security professionals can collaborate to defeat malicious actors and improve defenses.

The Smart Office Needs to Know Security

More devices are connecting to the Internet, making the smart office of the future a reality today. But these offices need to know security.

A New Archetype for Mobile and Cloud Security

Security solutions must evolve to work seamlessly with cloud and mobile technologies, but this process will be incremental and slow.

Security’s Imminent Game Changer: The Cloud Hits a Walk-Off

Maintaining enterprise security requires a game-changing evolution of cloud and mobile security capabilities — and the technologies used to manage them.

Are These Airline Hacks Related?

Several confirmed or suspected hacks of major airlines wreaked havoc on global travelers, but were there more to these attacks than meets the eye?

Endpoints: The Beginning of Your Defense

Every endpoint connected to your system is a point of vulnerability. It takes compromising only one for attackers to infiltrate your entire infrastructure.