12 Posts

Scott Koegler

Freelance Writer and Former CIO

Scott Koegler practiced IT as a CIO for 15 years. He also has more than 20 years experience as a technology journalist covering topics ranging from software and services through business strategy. Scott publishes ec-bp.com, a supply chain industry newsletter and has written for publications including Network Computing, Forbes, Internet Evolution, and many others.

Written By Scott Koegler

Cybersecurity Regulations Get Demanding

CISOs must closely monitor their companies' business transactions to maintain compliance with the growing number of international security regulations.

Shadow IT Comes of Age

Harnessing shadow IT starts with security leaders. IT and security teams must work together to identify problem areas and provide quality solutions.

CSOs Who Understand the User Experience Deliver Better Security

A smooth user experience leads to more secure systems and databases. CSOs should consult users directly to resolve issues related to the data they access.

Learn to Love Online Dating Security

IT leaders must educate employees about online dating security to minimize the risks associated with the use of these services in the workplace.

Is the CISO Reporting Structure Outdated?

Many organizations are changing the CISO reporting structure to reflect growing influence of IT over other departments and domains.

The Most Unnerving Security Trends to Prepare for in 2017

To stay ahead of increasingly sophisticated cyberthreats, CISOs and IT professionals must pay attention to the top security trends emerging in 2017.

The CIO Must Take Charge of the Organization’s Application Portfolio

With more businesses turning to SaaS and cloud-based systems, CIOs often lack a proper understanding of the organization's application portfolio.

Move the CSO to a Different Place on the Security Org Chart

Organizations can improve their ability to enforce security policies and better serve business initiatives by shuffling the security org chart.

Subtlety Is the Danger for Cybercrime Security Efforts

With threats coming from all sides, it's easy for IT professionals to forget that cybercrime can take many unsophisticated forms.

Employ Enterprise Security Collaboration to Blunt Cyber Risks

Enterprise security collaboration is critical to protecting valuable business data. IT managers should consult executives and train them on cyberthreats.