IT Management

IT Management

Authors

More ...

Archives

/ Layla Reed

Why Security Awareness Training Fails: The Shift to Human Risk Management in Corporate Cybersecurity

Despite billions spent on security awareness training, human error remains the leading cause of breaches. Human risk management offers a data-driven alternative, focusing on behavioral change rather than knowledge transfer to address cybersecurity's most persistent vulnerability.

/ Leo Rossi

The Confidence Crisis: Why Nearly 60% of Security Chiefs Say Their Companies Can’t Handle a Cyberattack

Despite record cybersecurity spending, 58% of CISOs believe their organizations are unprepared for cyberattacks. Four fundamental challenges—budget misalignment, organizational silos, talent shortages, and inadequate executive support—create a dangerous gap between security investments and actual readiness, leaving companies vulnerable despite their best intentions.

/ Layla Reed

Palo Alto Networks Races to Shield Corporate America From Quantum Computing’s Cryptographic Threat

Palo Alto Networks launches quantum-safe security solution providing real-time cryptographic visibility to help enterprises protect against future quantum computing threats. The platform enables automated discovery and risk assessment of vulnerable encryption systems across global IT infrastructure.

/ Liam Price

When Innovation Becomes Paralysis: Why Security Chiefs Are Drowning in AI Possibilities

Chief Information Security Officers face an unexpected challenge: paralysis from AI abundance. Despite pressure to adopt artificial intelligence tools, security leaders struggle with vendor proliferation, integration nightmares, skills gaps, and regulatory uncertainty that create decision-making gridlock in enterprise security.

/ Grace Wright

When Cybersecurity Leadership Bypasses Its Own Rules: The CISA ChatGPT Incident

A senior CISA official uploaded sensitive government contracting documents to public ChatGPT, bypassing DHS-approved AI tools. The incident exposes critical gaps between federal cybersecurity policy and practice, raising questions about enforcement, training, and the challenges agencies face in securely adopting generative AI technologies.

/ Chloe Ortiz

The Death of the Perimeter: Why Identity-Based Security Is Replacing Traditional Firewalls

Traditional perimeter defenses are becoming obsolete as organizations shift to identity-based security models. The new paradigm verifies user identity continuously rather than granting trust based on network location, fundamentally transforming how enterprises protect assets in an era of remote work and cloud computing.

/ Grace Wright

Sandworm’s Shadow: How Russia’s Most Dangerous Hacking Group Targeted Poland’s Electric Infrastructure

ESET researchers have attributed December 2024 cyberattacks on Poland's electricity grid to Sandworm, Russia's elite GRU hacking unit. The operation highlights critical infrastructure vulnerabilities and escalating Russian hybrid warfare against NATO members, raising urgent questions about collective defense and deterrence strategies.

/ Emily Chen

Pentagon’s New Technology Chiefs Signal Major Shift in Defense Innovation Strategy

The Pentagon's Chief Technology Officer has selected six defense technology veterans with diverse backgrounds—from Amazon executives to marine biologists—to lead Critical Technology Areas, signaling a major shift in how the Defense Department approaches innovation and maintains technological superiority against strategic competitors.

Subscribe Newsletter

Subscribe to our newsletter and stay up to date with the latest news, updates, and exclusive offers. Join our community today!

/ Amelia Keller

Former Ripple CTO’s $100 XRP Price Target Ignites Fierce Debate Among Digital Asset Investors

Former Ripple CTO David Schwartz's comments on XRP potentially reaching $100 have divided the cryptocurrency community, exposing tensions between technical possibility and market reality. The debate highlights challenges facing digital assets as they navigate regulatory uncertainty, adoption hurdles, and investor expectations.

/ Micah Shaw

PSQuote Taps Industry Veteran Eric Sexton as CTO to Drive AI-Powered Revenue Intelligence Revolution

PSQuote's appointment of Eric Sexton as Chief Technology Officer signals a strategic push into AI-powered revenue forecasting as professional services firms face mounting pressure to improve project profitability and scoping accuracy in an increasingly competitive market.

/ Chloe Ortiz

Meta’s Reality Check: How Slowing VR Adoption Is Reshaping the Company’s Metaverse Ambitions

Meta CTO Andrew Bosworth's admission that VR is growing slower than hoped marks a strategic inflection point for the company's multibillion-dollar metaverse ambitions, prompting layoffs and a rebalancing of resources toward artificial intelligence while maintaining long-term commitment to immersive technology.

/ Leo Rossi

Chewy’s Technology Leadership Transition Arrives at Pivotal Moment for Pet Retail Giant’s Digital Strategy

Chewy's announcement of CTO Satish Mehta's retirement arrives at a critical moment as the pet retail giant navigates mounting pressure to accelerate AI integration and enhance membership programs. The search for new technology leadership will determine whether the company maintains its competitive edge in an increasingly sophisticated digital retail environment.

/ Zoe Wright

Torrent Pharmaceuticals’ Strategic Technology Leadership Shift Signals Industry-Wide Race for Innovation Expertise

Torrent Pharmaceuticals appoints Geena Malhotra, former Cipla Global CTO, as Chief Technology Officer, signaling the pharmaceutical industry's strategic shift toward technology-driven innovation. The move reflects growing recognition of technology as central to competitive advantage in pharmaceutical manufacturing and research.

/ Amelia Keller

How SAIC’s Mission Integration Strategy Could Transform Defense Technology Deployment

SAIC's chief technology officer Bob Ritchie advocates for mission integration to accelerate defense capability delivery, challenging traditional acquisition models. This approach emphasizes parallel development and deployment processes, modular architectures, and closer collaboration between contractors and warfighters to compress timelines from decades to months.

/ Jack Chen

Inside Citadel’s Technology Transition: What a CTO Change Signals for the Hedge Fund Giant

Citadel's Chief Technology Officer Umesh Subramanian is changing roles after seven years leading the hedge fund giant's technology operations.

/ Claire Bell

Inside the Alarming Security Failures Plaguing America’s Power Grid Infrastructure

A comprehensive survey of over 100 energy facilities reveals widespread cybersecurity vulnerabilities in operational technology systems controlling power generation and distribution. The study exposes fundamental security gaps including weak authentication, unpatched legacy systems, and inadequate network segmentation that leave critical infrastructure exposed to nation-state threats.

/ Layla Reed

How Cybersecurity Infrastructure Could Determine America’s AI Supremacy Over China

As the U.S.-China AI race intensifies, experts argue America's competitive edge lies not in algorithms alone, but in trustworthy, secure AI infrastructure. Cybersecurity excellence could prove more decisive than raw model performance in capturing global market share and defining AI leadership.

/ Aria Brooks

The Silent Theft: How Ghost Tapping Exploits Are Draining Accounts Through Contactless Payment Systems

Ghost tapping exploits are emerging as a critical threat to contactless payment security, with cybercriminals using modified NFC readers to initiate unauthorized transactions through wallets and clothing. This sophisticated fraud technique bypasses traditional security measures, targeting the 2.8 billion contactless cards globally while exploiting the convenience features consumers have embraced.

/ Zoe Wright

Inside the NSA’s Ambitious Blueprint to Revolutionize Federal Cybersecurity Through Zero Trust Architecture

The NSA has released comprehensive two-phase Zero Trust Implementation Guidelines from Fort Meade, providing federal agencies with unprecedented technical specifications for transitioning from legacy perimeter security to architectures that verify every access request, marking a critical milestone in meeting the 2027 OMB cybersecurity deadline.

/ Maya Grant

Tokyo and London Forge Strategic Alliance on Cyber Defense and Rare Earth Minerals Amid Beijing’s Growing Regional Dominance

Japan and the United Kingdom have announced a comprehensive partnership on cybersecurity and critical minerals supply chains, marking a strategic effort to reduce dependence on China. The agreement addresses both digital threats and resource security amid growing concerns about Beijing's dominance in rare earth production and state-sponsored cyber operations.

/ Emily Scott

America’s Cybersecurity Deficit: Why Strategic Vision Without Operational Execution Leaves Critical Infrastructure Vulnerable

The United States possesses comprehensive cybersecurity strategy documents but lacks operational roadmaps to implement them effectively. This gap between policy and practice leaves critical infrastructure vulnerable to sophisticated threats, requiring detailed frameworks for coordination, resource allocation, and accountability across government and private sectors.

/ Claire Bell

The Invisible Shield: Why Industrial Cybersecurity Still Can’t Quantify Its Worth to the Boardroom

Despite mounting threats to industrial control systems, OT cybersecurity teams face a persistent challenge: proving their value to executives when success means incidents that never happen. The struggle to quantify risk reduction in business terms leaves critical infrastructure chronically underprotected.

/ Layla Reed

GSA’s Stealth Cybersecurity Mandate Reshapes Federal Procurement Without Fanfare

The General Services Administration has quietly implemented comprehensive cybersecurity requirements for federal contractors, mirroring the Defense Department's CMMC framework but applying immediately to civilian agency contracts. The self-attestation model prioritizes accessibility over third-party verification, creating new compliance challenges for small businesses while attempting to strengthen federal supply chain security.

/ Claire Bell

Vulnerability Exploitation Overtakes Phishing as Primary Attack Vector, Cisco Reports Amid Rising MFA Bypass Threats

Cisco's latest threat intelligence reveals vulnerability exploitation has surpassed phishing as the primary attack method in Q4 2024, forcing enterprises to fundamentally reassess security strategies. The shift includes rising MFA bypass techniques, demanding urgent changes in resource allocation and defensive priorities.