Low-code/no-code platforms begot citizen developers and their innovative solutions, but a lack of formal training brings risks that must be managed.
CISO
John Siefert, Chris Hughes, Frank Domizio, and Rob Wood explain why applying software composition analysis (SCA) early in the development cycle makes it easier to address security issues when they arise.
CIOs and CISOs must learn to communicate openly to have the types of strong relationships that lead to healthy, successful companies. In this analysis, Kenny Mullican gives tips on how they can achieve them.
Learning when to say no is an important skill for CISOs, particularly, Robert Wood explains, when it comes to trendy or complex technologies and partnerships.
How do cybersecurity companies manage the complex nature of IT environments? In this Cybersecurity Minute, Robert Wood explains why portfolio companies have the solutions.
Frank Domizio explains how a modern CISO can communicate security needs and strategies to top leaders, peers, and their cybersecurity teams.
Analyst Robert Wood shares the three areas CISOs should focus on to improve their performance: data, supply chain risk, and team cultures.
CISO practitioner analyst Chris Hughes emphasizes why today’s CISOs need to prioritize their agenda to quantify risk, embrace zero trust, and fight talent burnout
A sustainable future is not out of reach but depends on how we continue efforts to build resilient cybersecurity frameworks which support the critical infrastructures, IoT, and open-source solutions we all depend on.
Bill reviews ThreatQuotient’s “2022 State of Cybersecurity Automation” report, which finds that the majority of organizations experience pain problems implementing these initiatives.
In episode 32, Chris looks at a new Cybersecurity Infrastructure Security Agency post that focuses on three critical steps for advancing vulnerability management across the ecosystem in IT.
Data is the lifeblood of every business today but requires strategy, security, and governance to drive insights and accelerate transformation.
It’s common for the C-suite to look at cybersecurity efforts with fear, uncertainty, and doubt (FUD). Here’s why that needs to stop, and how to do it.
In this Lightning Strike discussion, Acceleration Economy Analysts Bob Evans and Tony Uphoff discuss a recent Gartner analysis on top CEO priorities.
It’s often said that security must be baked in rather than bolted on, and this is especially true when it comes to CISO involvement in an organization’s data governance plans.
In Episode 51, Wayne uses a bet he once made with a CISO as a jumping-off point to discuss how the C-suite should approach cybersecurity.
Episode 21 of the Growth Swarm podcast covers the essential considerations, including real-time data, for CXOs who are leading digital transformation projects.
Episode 20 of the Growth Swarm podcast explores the ‘what,’ ‘why,’ ‘how,’ and ‘who’ of the oft-used term ‘digital transformation.’
When it comes to cyber risk quantification, cybersecurity as an industry has become abysmal. How can organizations overcome these challenges?
In Episode 44 of the CXO2 Minute, Wayne continues his examination of a CISO’s place within an organization and explains why boards are responsible for understanding all sides of technology.