37 Posts

Scott Koegler

Freelance Writer and Former CIO

Scott Koegler practiced IT as a CIO for 15 years. He also has more than 20 years experience as a technology journalist covering topics ranging from software and services through business strategy. Scott publishes ec-bp.com, a supply chain industry newsletter and has written for publications including Network Computing, Forbes, Internet Evolution, and many others.

Written By Scott Koegler

The IoT Is BYOD All Over Again

Like the rise of BYOD culture in the enterprise, the explosion of IoT devices generates a new set of challenges for security professionals.

Things to Consider Before Implementing Advanced Network Security

With the increasing sophistication of cybercriminals, advanced network security is more critical then ever to protect enterprise data.

Why Your Enterprise Security Strategy Needs to Evolve

A good security strategy must constantly evolve and adapt to current threats, new protective tools and burgeoning vulnerabilities.

Securing Your Cloud-Based Resources: Start With These Four Areas

With cloud-based resources becoming an integral part of the enterprise, it's time for security leaders to recognize the best ways to protect these assets.

Health Care Providers Need to Comply With HIPAA Regulations and Address These Five Critical Security Issues

Health care organizations must address these five major cybersecurity concerns to comply with HIPAA regulations and ensure proper handling of patient data.

Cybersecurity Regulations Get Demanding

CISOs must closely monitor their companies' business transactions to maintain compliance with the growing number of international security regulations.

Shadow IT Comes of Age

Harnessing shadow IT starts with security leaders. IT and security teams must work together to identify problem areas and provide quality solutions.

CSOs Who Understand the User Experience Deliver Better Security

A smooth user experience leads to more secure systems and databases. CSOs should consult users directly to resolve issues related to the data they access.

Learn to Love Online Dating Security

IT leaders must educate employees about online dating security to minimize the risks associated with the use of these services in the workplace.

Is the CISO Reporting Structure Outdated?

Many organizations are changing the CISO reporting structure to reflect growing influence of IT over other departments and domains.