50 Posts

Scott Koegler

Freelance Writer and Former CIO

Scott Koegler practiced IT as a CIO for 15 years. He also has more than 20 years experience as a technology journalist covering topics ranging from software and services through business strategy. Scott publishes ec-bp.com, a supply chain industry newsletter and has written for publications including Network Computing, Forbes, Internet Evolution, and many others.

Written By Scott Koegler

CSOs Who Understand the User Experience Deliver Better Security

A smooth user experience leads to more secure systems and databases. CSOs should consult users directly to resolve issues related to the data they access.

Learn to Love Online Dating Security

IT leaders must educate employees about online dating security to minimize the risks associated with the use of these services in the workplace.

Is the CISO Reporting Structure Outdated?

Many organizations are changing the CISO reporting structure to reflect growing influence of IT over other departments and domains.

The Most Unnerving Security Trends to Prepare for in 2017

To stay ahead of increasingly sophisticated cyberthreats, CISOs and IT professionals must pay attention to the top security trends emerging in 2017.

The CIO Must Take Charge of the Organization’s Application Portfolio

With more businesses turning to SaaS and cloud-based systems, CIOs often lack a proper understanding of the organization's application portfolio.

Move the CSO to a Different Place on the Security Org Chart

Organizations can improve their ability to enforce security policies and better serve business initiatives by shuffling the security org chart.

Subtlety Is the Danger for Cybercrime Security Efforts

With threats coming from all sides, it's easy for IT professionals to forget that cybercrime can take many unsophisticated forms.

Employ Enterprise Security Collaboration to Blunt Cyber Risks

Enterprise security collaboration is critical to protecting valuable business data. IT managers should consult executives and train them on cyberthreats.

Secure Your IoT Deployment by Paying Attention to These Four Factors

It has never been more important to secure your IoT deployment. Challenges include lack of visibility, inexperience and the IoT's increasing complexity.

Understanding the CIO’s Role in Security

The CIO's role in security includes understanding the company's key vulnerabilities, spreading internal awareness and communicating with top executives.