Most Popular Articles in Vol 277 Issue 2, Grouped into Sections
CIONET Spotlight. Your weekly 30-minute high-value insights intake.
Join us for this roundtable as we help you navigate the real meaning of Digital Transformation and Employee Experiences
Join us for this roundtable discussion with CSO's Contributing Editor, Bob Bragdon, along with Kurt Roemer, Chief Security Strategist at Citrix, as we collectively share experiences and leading practices for addressing these challenges across your organization
The perils of security breaches are widely publicized, but do you know exactly how an attack or breach would affect your business?
Strategies to help your organization prepare for, defend against and respond to breaches.
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join CIO contributing editor Charles Pelton and AI/machine learning subject-matter experts from our roundtable sponsor, Supermicro, for a private, interactive, virtual roundtable.
Attendees will receive a certificate awarding 1 CPE credit for CISSP continuing education, in addition to 0.1 CEUs and 1 PDU
Join CIO contributing editor Charles Pelton and subject-matter experts from our roundtable sponsor, HPE, for a private, interactive, virtual roundtable.
Develop a resilient data and analytics strategy for an AI-ready, data-centric organization
Courageous Leadership and Fearless Reinvention: Securing the Modern Enterprise in Dynamic Times
Strategies for An Evolving Business Climate
Join CIO contributing editor Lane Cooper and subject-matter experts from our roundtable sponsor, IBM, for a private, interactive, virtual roundtable.
A key reason for many enterprise security breaches is that security teams
find themselves supporting systems, applications, and devices that they
didn't know they had
Get the latest insights on privileged access management, IT security and privacy virtually at Gartner Identity & Access Management Summit 2021, Americas.
Join us as we honor technology leaders in South Florida
Strategies for reducing risk to the enterprise.
Join your peers to discuss the most critical issues impacting CISOs today
Check out these five thought-provoking HBR articles, curated especially for CIOs and IT leaders
Worldwide IT spending is projected to total $4.1 trillion in 2021, an increase of 8.4% from 2020, according to the latest forecast by Gartner. The source of funds for new digital business initiatives will more frequently come from business departments outside IT and charged as a cost of revenue or cost of goods sold (COGS).
As CIOs embrace more digital technologies, it's important that they determine the current status of their legacy systems and whether it's worth upgrading or maintaining them
Today's CIO needs more than technology mastery. Long-term career success also demands a commitment to developing a set of core business skills.
trategies CISOs need to put in place to deal with a rising volume of attacks were discussed by a panel of security leaders during a webinar
The CIO-CFO dynamic has undergone some changes over the past 10 years. What are these changes and how do they influence corporate dynamics?
78% of businesses plan to increase their spending on automation initiatives in the coming 12 months, SnapLogic research reveals
CIOs are helping to facilitate growth through new technologies, IT strategies and revenue initiatives
Insurance and financial firm MassMutual's chief information security officer talks about the changing threat landscape and how data science is helping the security team's charter
'We must do more to cultivate new jobs and new worker skills.' -- Irving Wladawsky-Berger, research affiliate, MIT's Sloan School of Management
Sharing intel makes criminals dangerous
With increasing board interest in cybersecurity risk, CISOs need to explain the preventive steps they are taking to have the right cybersecurity testing in place to minimize risk
April 13th is Identity Management Day - a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA).
Security behavior is what most organizations neglect when it is something every organization should focus on for securing their business against cyber threats
In this Help Net Security podcast, Maurits Lucas, Director of Intelligence Solutions at Intel 471, discusses the benefits of cyber threat intelligence
Manage these risk indicators to protect students, faculty, and staff against insider DLP risks
Ensuring data security becomes harder every day. Firstly, sensitive data is often spread across on-premises and cloud-based storage locations, which makes it more difficult to maintain security controls
Researchers uncover a fresh set of nine vulnerabilities in four TCP/IP stacks that are widely used in everything from powerful servers and firewalls to consumer IoT products
Identity Management Day is a way to educate about the importance of securing identity and access credentials
Today's organizations need to enable their IT teams to rapidly deploy, manage and maintain their applications and services
DevOps is a software development strategy that incorporates agile practices for fast, efficient product creation and release
DevOps isn't just a cultural shift - it requires great tools to come to fruition
IT news and analysis outlet CRN recently released its 2021 Storage 100, a ranking of innovative storage providers that offer solutions and technology that span the scope of business user requirements
MRAM in 2022, PLC, SCM, RAMDisk and why computational storage is not so promising
Data, data everywhere, but where to put it all? Here's a rundown of five current and potential fast and high-capacity storage approaches
Our best practices for managing data are ancient. Literally.
With new cyber threats coming up every day, security systems, especially those used by corporations, need to adapt. But instead of constantly needing updates from their manufacturers, what if endpoint security software can play a direct role in improving itself?
It's twice as fast as existing memory and has twice the capacity, paving the way for new use cases
Download cheat sheets for sed, grep, and parted to integrate new processes into your work
Despite putting in extra effort, most employees don't think they are receiving enough praise
The question is no longer IT services vs telecoms, but which players will be able to offer the right value add services ``
|