featureThe BISO: bringing security to business and business to securityEven the most tech-savvy leaders can use an effective liaison between corporate and cybersecurity—the business information security officer (BISO) bridges communications gaps and acts as a security evangelist and gatekeeper.By Deb Radcliff05 Jan 20237 minsC-SuiteBusiness IT AlignmentData and Information Security feature How acceptable is your acceptable use policy?By Vawn Himmelsbach14 Dec 20228 minsCSO and CISOAccess ControlBusiness IT Alignmentfeature 8 things to consider amid cybersecurity vendor layoffsBy Michael Hill01 Dec 202212 minsBusiness OperationsVendors and Providers opinionCISOs: Do you know what's in your company’s products?By Christopher Burgess 05 Aug 20214 minsCSO and CISOBusiness OperationsSecurity Articles View all Resources whitepaper Global Data Insights Survey 67% of respondents are executing data strategies that guide IT infrastructure investments, but 52% cite a lack of sufficient investment in infrastructure is a top obstacle. The post Global Data Insights Survey appeared first on Whitepaper Repository –. By Digital Realty Trust, L.P. 25 Oct 2024Artificial IntelligenceBusiness OperationsEnterprise whitepaper The State of Data and AI in Europe By Digital Realty Trust, L.P. 25 Oct 2024Artificial IntelligenceBusiness OperationsEnterprise whitepaper Harnessing a modern SIEM to build a cost-efficient, resilient & intelligent SOC to avoid revenue impact and outages By Sumo Logic 07 Oct 2024Business OperationsSecurity Information and Event Management SoftwareSecurity Operations Center View all Explore a topic Application Security Business Continuity Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Androxgh0st botnet integrates Mozi payloads to target IoT devices By Lucian Constantin 08 Nov 20245 mins BotnetsThreat and Vulnerability ManagementVulnerabilities news US consumer protection agency bans employee mobile calls amid Chinese hack fears By Gyana Swain 08 Nov 20244 mins Hacking opinion Choosing AI: the 7 categories cybersecurity decision-makers need to understand By Christopher Whyte 08 Nov 202410 mins CSO and CISOSecurity PracticesSecurity Software podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 1) 04 Nov 202419 mins Supply ChainCritical InfrastructureSecurity video CSO Executive Sessions: Standard Chartered’s Alvaro Garrido on cybersecurity in the financial services industry 23 Oct 202410 mins Financial Services IndustrySecurity video CSO Executive Sessions: New World Development’s Dicky Wong on securing critical infrastructure 16 Oct 202412 mins Critical InfrastructureSecurity