As we adapt to a future of remote workers, this is a critical time to ensure you have an incident response plan in place, and can adapt for an indefinite change in operational processes – including who is managing this response.
With the COVID-19 virus forcing people to stay at home, many enterprises suddenly have to support an entirely remote workforce. IDG influencers shared advice about how IT leaders can handle this new dynamic and the technology required during a recent #IDGTECHtalk Twitter chat.
As a venture capitalist that invests solely in seed stage cybersecurity entrepreneurs, I often ask myself what keeps CISOs up at night to inform which gaps the next round of enterprise security products needs to address.
When every employee is part of the security equation, having a security culture that includes education, collaboration between IT operations and security teams, and security tools is essential. That was the consensus among participants in a recent IDG TECH(talk) discussion.
Sometimes enterprise require a culture shake-up — or at least a culture harmonization, as Barings CIO Andy Lennon learned when he accepted the challenge of unifying up 5 organizations under on tech umbrella.
The lessons learned from a decade of digital transformation provide a roadmap for those embarking on their own initiatives. CIO, Computerworld, CSO, InfoWorld, and Network World team up to dissect that legacy from every angle.
The California Consumer Privacy Act of 2018 is a bill intended to enhance online privacy rights and consumer protection for residents of California, United States. But the bill has national and global implications. Here’s how to prepare your organization for compliance and protect your customers.
There are literally thousands of SaaS applications that can be used to manage almost every aspect of a company’s internal operations. On a bad day it may seem as if your company has purchased all of them! Here are some tips on how IT organizations can provide responsible application oversight even in the absence of direct application ownership.
The human-centric focus of healthcare has given digital health developers a different perspective on how they deploy IoT technology. Industrial developers can learn from these practices – patient first, the Quadruple Aim and the Nudge – to accelerate the success of their operation-centric efforts.
As efforts to implement comprehensive security engineering frameworks and policies grow across various enterprises, it makes sense to implement a hands-on training program focused on educating your employees with basic cybersecurity best practices – so they don’t fall for phishing scams.
Despite increasing cybercrime and dependency on digital revenues, many CEOs operate in the dark. A stunning 63 percent of CISOs don’t regularly report to their board, research by Ponemon Institute finds.
BrandPosts are written and edited by members of our sponsor
community. BrandPosts create an opportunity for an individual
sponsor to provide insight and commentary from their point-of-view
directly to our audience. The editorial team does not participate
in the writing or editing of BrandPosts.