While the CISO's role is more important than ever, recent studies have revealed a disconnect between CISOs and business executives and difficulities communicating security risks in business terms.
Security managers and IT teams today often try to tackle everything in-house, even though they don't always have the skills and resources to run an effective security program.
While securing the variety of known devices on your network is hard work, it may feel impossible to manage uninvited guests. Here's how to effectively manage rogue devices.
Take a look at some traits from the famous "Star Wars" characters we've grown to love and explore how those might be applicable to CISOs today.
We know what needs to be done for security and why we need to do it, but we are often missing steps for how to do it. We need real security for real life.
In planning for and responding to a data breach, IT experts should work with business continuity teams as part of a cohesive incident response plan.
Security management teams can benefit from millennial employees if they take steps to attract top talents and retain them with unique benefits.
Increased cyberthreats and compliance regulations are requiring organizations to pay more attention to their security management strategy.
Security management tools are key to a company's security, but organizations must decide who has permission to use them and for what reason.
At IBM InterConnect 2015, UC Berkeley security gurus used Taylor Swift memes to help make their points when describing how IBM helps them manage security.