19 Posts

Scott Koegler

Freelance Writer and Former CIO

Scott Koegler practiced IT as a CIO for 15 years. He also has more than 20 years experience as a technology journalist covering topics ranging from software and services through business strategy. Scott publishes ec-bp.com, a supply chain industry newsletter and has written for publications including Network Computing, Forbes, Internet Evolution, and many others.

Written By Scott Koegler

Five Ways in Which the IoT Will Disrupt Your Business

If approached with a solid focus on security, the IoT has the potential to disrupt your business in a way that helps it become more efficient.

CISO Succession Planning Takes Preparation

In light of the skills shortage and the highly competitive CISO job market, careful succession planning is the key to leaving your company in good hands.

The IoT Is BYOD All Over Again

Like the rise of BYOD culture in the enterprise, the explosion of IoT devices generates a new set of challenges for security professionals.

Things to Consider Before Implementing Advanced Network Security

With the increasing sophistication of cybercriminals, advanced network security is more critical then ever to protect enterprise data.

Why Your Enterprise Security Strategy Needs to Evolve

A good security strategy must constantly evolve and adapt to current threats, new protective tools and burgeoning vulnerabilities.

Securing Your Cloud-Based Resources: Start With These Four Areas

With cloud-based resources becoming an integral part of the enterprise, it's time for security leaders to recognize the best ways to protect these assets.

Health Care Providers Need to Comply With HIPAA Regulations and Address These Five Critical Security Issues

Health care organizations must address these five major cybersecurity concerns to comply with HIPAA regulations and ensure proper handling of patient data.

Cybersecurity Regulations Get Demanding

CISOs must closely monitor their companies' business transactions to maintain compliance with the growing number of international security regulations.

Shadow IT Comes of Age

Harnessing shadow IT starts with security leaders. IT and security teams must work together to identify problem areas and provide quality solutions.

CSOs Who Understand the User Experience Deliver Better Security

A smooth user experience leads to more secure systems and databases. CSOs should consult users directly to resolve issues related to the data they access.