5 rules for a healthy CIO-CISO relationship Box's CIO shares tips on how to change the traditionally contentious CIO/CISO relationship into a...
Security 2020: 4 trends to watch What are the key trends in the enterprise threat landscape in 2020? Here are four security issues...
Digital transformation: 3 ways to manage security risk How can IT leaders manage the security risks associated with digital transformation without becoming...
Robotic Process Automation (RPA) in 2020: 5 trends to watch What’s next for robotic process automation? Look for reality checks about fit, new partnerships...
Security attacks: 3 habits of the most resilient companies Is your organization highly resilient to cyber attacks? Consider these three approaches to building...
How to explain CVE, Common Vulnerabilities and Exposures, in plain English CVE (Common Vulnerabilities and Exposures) is a list of publicly known cybersecurity vulnerabilities...
Mobile security: 5 misunderstandings that persist Mobile has become ubiquitous in the enterprise: So why do so many organizations still buy into these...
Multi-cloud security: 7 issues to watch Using multiple cloud providers is not riskier than using one: Each arrangement has its pros and cons...
How to fight deepfakes and ransomware: Better security training Did you hear about the CEO who was recently duped by an AI-powered deepfake voice scam? It’s time to...
Cloud security: 4 layers of protection you need Maybe a ticked off employee will seek revenge. Maybe someone will accidentally delete critical files...