30 Posts

Scott Koegler

Freelance Writer and Former CIO

Scott Koegler practiced IT as a CIO for 15 years. He also has more than 20 years experience as a technology journalist covering topics ranging from software and services through business strategy. Scott publishes ec-bp.com, a supply chain industry newsletter and has written for publications including Network Computing, Forbes, Internet Evolution, and many others.

Written By Scott Koegler

Cybercrime Awareness Should Be Fun

Cybercrime awareness training is too crucial to be glossed over during onboarding or quickly rehashed at the end of the year.

Employee Education Is the Key to Enhanced Protection for Energy Companies

The U.S. energy infrastructure requires enhanced protection, and CISOs must educate their employees about security risks to those critical assets.

Connecting Fintech Security Perceptions to Reality

The state of fintech security will fluctuate based on the industry's ability to maintain regulatory compliance and stay abreast of cybercrime trends.

How Hotel Cybersecurity Keeps Guests and Data Secure

Hotel cybersecurity is not just about protecting financial data — it extends to guests' physical and digital property, vulnerable endpoints and more.

Execute Your IoT Deployment by the Book

More connected devices means a larger threat surface. That's why it's critical to prioritize security when designing your IoT deployment.

Five Ways Enterprises Can Close the Cybersecurity Skills Gap

To reduce the effects of the cybersecurity skills gap, organizations should ditch traditional recruiting methods and think outside the box.

Closing the Cybersecurity Skills Gap Through Mergers and Acquisitions

To close the cybersecurity skills gap, a large company with considerable funds can simply acquire another organization and conscript its IT talent.

Asleep at the Switches: Don’t Let Cyber Fatigue Catch Your Enterprise Off Guard

To combat cyber fatigue, security leaders must communicate the importance of password hygiene without diluting the message.

Four Key Considerations for Managing Your IoT Population

To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.

Four New Cyberthreats on the CISO’s Radar

An effective defense against cyberattacks such as ransomware, dronejacking and hacktivism requires a deep understanding of the evolving threat landscape.