Worthwhile Reading
What savvy hiring execs look for in a CISO today

The CISO role is undergoing a sea change, requiring a range of seemingly contradictory skills and experiences. Here’s how experts see the role evolving — and how hiring execs assess the blend of “Mother Teresa and a kamikaze pilot,” as one CIO puts it, necessary to succeed as a CISO today.
CSO, July 16, 2024

Electronic Health Record Errors Are a Serious Problem

One of the original goals for electronic health records was to reduce medical errors. Here’s a look at how this developing technology has threatened patient safety -- along with insights from a scary situation my own family recently experienced.
Information Week, July 9, 2024

6 IT risk assessment frameworks compared

Formal risk assessment methodologies can help take guesswork out of evaluating IT risks if applied appropriately. Here are six to consider.
CSO, August 9, 2024

How Leadership Missteps Can Derail Your Cloud Strategy

Inadequate planning leads to costly misalignments in resources and objectives, underlining the importance of a comprehensive strategy in cloud implementation.
Information Week, February 26, 2024

IT’s Waste Management Job With Software Applications

In an era of SaaS waste and forgotten software, is anyone taking out the garbage?
Information Week, March 8, 2024

6 tips for consolidating your IT security tool set

Spending sprees, acquisitions, siloed departments, and escalating security concerns have many CISOs drowning in security solutions. Here’s how to rein in the tool sprawl and ensure enhanced security as you streamline your security stack.
CSO, July 11, 2024

CIOs are stretched more than ever before — and that’s a good thing

Modern digital leaders have to climb an ever steepening responsibility curve. Successful CIOs embrace this challenge and collaborate with their executive peers to transform the business.
CIO, July 17, 2024

Talent Management: The Missing CIO Management Strategy

Talent management and development are seldom listed as goals in IT strategic plans. However, is it time for this to change?
Information Week, February 21, 2024

7 open source security tools too good to ignore

These must-have open-source tools help CISOs and their teams scan for vulnerabilities, analyze protocols, run forensics, and support threat intelligence and encryption.
CSO, June 27, 2024

The Rise of Dual Ransomware Attacks

One ransomware attack is bad enough, but threat actors won’t always stop there. Dual attacks are a trend to watch.
Information Week, January 9, 2024