interviewUnited Airlines CISO Deneen DeFiore on elevating cyber’s value to the businessThe airlines’ cyber chief believes storytelling, facilitation, and a marketing mindset are vital for moving IT and cybersecurity up the organizational value chain to the benefit of the business overall.By Dan RobertsMay 25, 20238 minsCSO and CISOBusiness IT AlignmentData and Information Security news Register for CSO's Future of Cybersecurity SummitBy Beth KormanikMay 24, 20234 minsSecurity PracticesCareersIT Leadershipopinion Generative AI & data: Potential in cybersecurity if the risks can be curtailedBy Rick GrinnellMay 13, 20237 minsData and Information SecurityArtificial IntelligenceSecurity featureWhy IT leaders are putting more business spin on security spendBy Robert Scheier Apr 13, 20237 minsCIOCSO and CISOBudgeting opinionWhere is the AI?By Rick Grinnell Apr 12, 20238 minsArtificial IntelligenceSecurity feature7 trends defining the enterprise IT market todayBy John Edwards Apr 11, 20239 minsPrivate 5GMachine LearningEdge Computing featureCIOs address the impact of hybrid workBy Pat Brans Mar 28, 20238 minsCIORemote WorkEmployee Experience featureWhat is data governance? Best practices for managing data assetsBy Thor Olavsrud Mar 24, 202310 minsIT Governance FrameworksBig DataData Mining opinionHow can CIOs protect Personal Identifiable Information (PII) for a new class of data consumers?By Yash Mehta Mar 22, 202310 minsData PrivacyData ScienceMachine Learning ArticlesbrandpostSponsored by Tanium5 strategies for boosting endpoint managementHow should CIOs and other IT leaders respond to evolving cyber threats? Here are five tips. Mar 15, 2023 5 minsSecuritybrandpostSponsored by TaniumThink your attack surface is too large? You don’t know the half of itMultifactor authentication and employee training help, but given time and opportunity, even less-experienced attackers can break into poorly secured accounts. All it takes is one vulnerable individual to break into an account—or into an entire organization.By Jason Bloomberg, Managing Partner, Intellyx Mar 15, 2023 6 minsSecuritybrandpostSponsored by TaniumProactive cybersecurity: sometimes offence is the best defenseGoing on the offensive with cybersecurity involves taking extra steps to preemptively identify weaknesses before bad actors can take advantage of them. Mar 15, 2023 6 minsSecuritybrandpostSponsored by TaniumSoftware bill of materials: a critical component of software supply chain securityOne of the most effective tools for finding and addressing such vulnerabilities and keeping software secure is the software bill of materials (SBOM). Mar 15, 2023 6 minsSecuritybrandpostSponsored by Tangoe5 best practices for managing your mobile fleetHere are five best practices for managing your mobile strategy, the fleet itself, and the costs. By Chris Ortbals, CPO, Tangoe Mar 15, 2023 8 minsRemote Access SecurityMaster Data ManagementEndpoint ProtectionbrandpostSponsored by EdgioDebunking conventional wisdom: increased security improves performance and customer experienceIT leaders do not have to compromise. Advanced security policies, increased efficiencies, and improved user experience can be achieved together. By Richard Yew, Edgio Sr. Director Product Management – Security Feb 22, 2023 5 minsSecurityopinionHow to ensure security in a cloud migrationCIO followers expound on ways to stay secure when moving to the cloud.By Paul Desmond Feb 07, 2023 6 minsCloud ManagementCloud SecuritySecurityopinionFresh start: Time to reset passwords and rethink your password management strategyOrganizations need to assess how they provide and manage access to their critical systemsBy Rick Grinnell Feb 07, 2023 6 minsPasswordsPassword ManagersSecuritybrandpostSponsored by TaniumCyber hygiene: because prevention is always easier than treatmentPreventing risks and breaches through cyber hygiene across endpoints is safer than remediation. And if done well, cyber hygiene can become a lightweight part of the way the company operates.By Jason English (@bluefug), Principal Analyst, Intellyx Dec 22, 2022 6 minsSecuritybrandpostSponsored by CohesityRansomware Warranties: Gimmick or Guarantee?Why the guarantee of a world-class data security platform beats ransomware warrantiesBy Cohesity Dec 08, 2022 6 minsRansomwareSecurityopinionAdd brand security to your workloadSocial media and web spoofing can tarnish your brand and market cap.By Rick Grinnell Dec 06, 2022 5 minsTwitterSocial Networking AppsSecuritycase studyMusic distributor tracks SaaS usage to boost security, satisfactionSaaS management is about much more than cost control, says CD Baby’s VP of IT Tom Beohm.By Peter Sayer Nov 21, 2022 7 minsSaaSERP SystemsSecurity Show more Show less View all Upcoming Events06/Jun virtual roundtableEnsuring Security Through Business Transformation: Strategies for Managing Risk in Complex and Dynamic Enterprise EnvironmentsJun 06, 20231:00pm EST / 10:00am PSTVirtual Data and Information SecurityPrivacySecurity 08/Jun virtual summit CSO's Future of Cybersecurity SummitJun 08, 2023Virtual CSO and CISOCyberattacksSecurity 14/Jun roundtable dinnerSponsored by & Moving the Focus to Data Recovery: Enhancing Business ResiliencyJun 14, 20231:00pm ET/10:00am PTVirtual Data and Information SecurityPrivacySecurity View all events Resources whitepaper HBR Whitepaper: Elevating the Value of Customer Service Through a Data-Driven Approach Your customer service team already has the data it needs for growth. Cost savings. Increased efficiency. The post HBR Whitepaper: Elevating the Value of Customer Service Through a Data-Driven Approach appeared first on Whitepaper Repository. By Salesforce & Coveo for Service 30 May 2023Business OperationsSalesforce.comService Management Software whitepaper Customer Service Agent Relevance Report 2023 By Salesforce & Coveo for Service 30 May 2023Other whitepaper HBR Whitepaper: Elevating the Value of Customer Service Through a Data-Driven Approach By Salesforce & Coveo for Service 30 May 2023Business OperationsSalesforce.comService Management Software View all Podcasts podcastsThe C-level Strategic Guide for CIAM investmentWhat is customer identity and access management (CIAM) and why is it essential to your business? Simply put, if your customers don’t feel secure using your products or accessing your websites, they won’t sign up or share information. Join us as we explore the business challenges around CIAM, how to assess where you fall on the CIAM Maturity Curve, and how to move ahead. 5 episodesIdentity and Access Management Ep. 04 Episode 4: Adding Intelligence to Your CIAM Strategy May 25, 202120 mins OktaIdentity and Access ManagementSecurity Ep. 03 Episode 3: You've Passed CIAM 101 — Now It's Time to Automate May 12, 202115 mins OktaIdentity and Access ManagementSecurity Explore a topic Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations View all topics All topics Close Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations Emerging Technology Digital Transformation IT Strategy Innovation Diversity and Inclusion Project Management Show me morePopularArticles feature 10 highest-paying IT skills for 2023 By Sarah K. White May 11, 20238 mins SalariesIT JobsIT Skills feature 10 highest-paying IT jobs By Sarah K. White Apr 27, 20237 mins SalariesIT JobsCareers opinion 5 IT management practices certain to kill IT productivity By Bob Lewis May 16, 20237 mins IT Leadership