Improve the resiliency of multifactor authentication by giving users more information, making default settings more secure, hiding secrets and more.
Multifactor authentication boosts the safety of usernames and passwords, but depending on the MFA method used, it may not offer as much protection as you might think.
To better secure user accounts and data, it's time to make MFA more resilient.
At Authenticate 2022, Roger Grimes, data-driven defense evangelist at security awareness company KnowBe4, presented how vendors can improve their MFA products.
We are living in interesting times. With the pandemic mostly behind us but still lingering, our IT teams have adopted fairly well in producing remarkable results by collaborating and working remotely.
In this short article, I will share how we can make our teams even more productive by supercharging them in a post-pandemic era and implementing the following ideas in a virtual setting or in person:
1. Have Fun: IT professionals spend 50-60 or even more hours on their jobs. If they are not having fun, they will burn out faster and possibly be not as productive. There are several ways you can make their professional lives fun...
My year as a venture capital CISO-in-residence.
The CISO role has evolved dramatically over the past decade, maturing from security officer to impactful business leader who, increasingly, is a part of their organization's C-suite. In light of the considerable impact security risks have on business objectives, this is a welcome transformation. Encouraging employees to go beyond their day-to-day and view security as a priority, making allies of users and business managers and providing the organization with tangible value, is extremely rewarding.
From AI to digital transformation and everything in between, these HBR articles cover the critical topics IT leaders care about most
Through our partnership with Harvard Business Review, we regularly refresh our resource library with five new HBR articles we believe CIOs and IT leaders will value highly. Check out the curated pieces below, available to readers now.
- Why You Need an AI Ethics Committee
- How to Overcome Your Fear of the Unknown
- 4 Types of Business Transformation
- How leaders can escape their echo chambers
- Is your company squandering digital opportunities?
Read on for details
It takes a team to implement digital transformation, but these three roles can make the difference between success and failure. Here's how
Companies are like high-performance engines - they're optimized over time to create the greatest output. They handle small incremental changes and fine-tuning well but often break down when broader changes and rebuilding are needed.
Enter the digital transformation journey. How can companies learn how to shift quickly to meet the needs of their customers, employees, and the market when incremental progress isn't working? What roles can help ensure success along the way?
Top CIOs with military backgrounds share the leadership advice that has helped shape their career success
Turbulent times can either paralyze you with fear or energize you with unlimited opportunities - and great leaders are often what make the difference. In the midst of complexity and volatility, top leaders anticipate and adapt. They build clarity out of uncertainty. They communicate a vision that inspires you to strive for more. They challenge and elevate their teams, giving people the confidence to not just persevere but step up to the big moments and make bold things happen.
As sophisticated cyber threats increase in volume and effectiveness, organizations across all industries are shifting from a threat-preventive approach to a cyber defense model.
The recent acceleration of digitalization has made organizations re-evaluate their cybersecurity preparedness. In today's hybrid world, we must fortify data with modern surveillance techniques that promote resilience and business continuity. More than ever, organizations must invest in a robust security infrastructure to combat cybercrimes.
Ransomware groups are becoming more sophisticated and are increasing in volume, with 35 vulnerabilities associated with ransomware during the first three-quarters of 2022 and 159 trending aggressive exploits. To make matters worse, a lack of adequate data and threat context makes it difficult for organizations to effectively tweak their systems and effectively mitigate vulnerability exposure.
Tom Sweet, CIO of Industrial Refrigeration Pros, reflects on the initial three months of his first job as head of technology and security.
I set my career sights on becoming a CIO or a CTO many years ago. In 2019, I was a finalist for two C-level opportunities but was selected for neither one. I learned a lot from the experiences and am grateful for them. Though rejection feels lousy, it can also be a blessing. It is far worse to be selected for a role and then not fit in with the company culture or values.
Ultimately in 2022, a referral led to my first CIO opportunity at a private equity-backed venture. New to the Dallas-Fort Worth area and in need of an IT leader for this growing firm, the CEO reached out to an ERP consultant for some referrals.
See all Archived IT News - CxO articles
See all articles from this issue