Latest from todayOpinionCybersecurity isn’t underfunded — It’s undermanagedToward a new leadership narrative for the modern CISO.By JC GaillardDec 11, 20257 minsC-SuiteCSO and CISOIT Strategy How-To How to justify your security investments By Chritstoph SchuhwerkDec 11, 20256 minsC-SuiteCSO and CISOIT LeadershipOpinion How can staff+ security engineers force-multiply their impact?By Priyank DesaiDec 10, 202510 minsIT LeadershipIT ManagementStaff Management OpinionQuantum meets AI: The next cybersecurity battlegroundBy Nathaniel Adeniyi Akande Dec 10, 20257 minsData and Information SecurityEncryptionIT Strategy OpinionAvoiding the next technical debt: Building AI governance before it breaksBy Marco Túlio Moraes Dec 5, 20257 minsArtificial IntelligenceIT GovernanceRisk Management NewsAI creates new security risks for OT networks, warns NSABy John E. Dunn Dec 4, 20254 minsArtificial IntelligenceCritical InfrastructureIT Strategy Feature12 signs the CISO-CIO relationship is broken — and steps to fix itBy Mary K. Pratt Dec 1, 202511 minsC-SuiteCSO and CISOSecurity Practices Feature7 signs your cybersecurity framework needs rebuildingBy John Edwards Nov 25, 20257 minsIT GovernanceROI and MetricsSecurity Practices Feature2026 CSO Hall of Fame call for nominationsBy CSO events Nov 24, 20255 minsCareersData and Information SecurityRisk Management Enterprise Buyer’s Guides Feature Download the ‘AI-Savvy IT Leadership Strategies’ Enterprise Spotlight In this issue: AI is requiring a reset for CIOs and other IT leaders in how they lead both their technical and business strategies and execution approaches. Here, we explore some of the implications of artificial intelligence on IT leadership. May 1, 2025 1 min Artificial Intelligence Enterprise Buyer’s Guides IT Strategy Feature AI-SPM buyer’s guide: 9 security posture management tools to protect your AI infrastructure Sep 17, 2024 10 mins Enterprise Buyer’s Guides Security Infrastructure Security Practices ArticlesopinionInvisible battles: How cybersecurity work erodes mental health in silenceCyber pros are burning out in the shadows, proving you can’t secure the business if you don’t take care of the humans behind the screens.By Maman Ibrahim Nov 24, 2025 8 minsBurnoutEmployee ExperienceHuman ResourcesfeatureThe CISO’s greatest risk? Department leaders quittingA security exec’s job is not just to manage cyber risk. Protecting personnel from burnout, championing cyber’s business value, and fostering career growth are just as vital to building a resilient, sustainable organization.By Esther Shein Nov 24, 2025 9 minsCSO and CISOSecurity PracticesStaff ManagementopinionFrom code to boardroom: A GenAI GRC approach to supply chain riskGenAI GRC flips supply chain risk from paperwork to real-time smarts, helping CISOs spot trouble early and keep the board focused on resilience.By Adetunji Adebayo Nov 21, 2025 7 minsGenerative AIIT GovernanceRisk Managementopinion3 ways CISOs can win over their boards this budget seasonTo land your budget, show the board the real financial risk, plan past compliance and speak their language — not just security jargon.By Chris Wheeler Nov 20, 2025 7 minsBudgetingComplianceRisk Managementevents promotion CSO EventsCSO Award and Hall of Fame Nominations Open NowGet recognition for your organization’s innovations in security. Submit by April 10 to be considered.By CSO Events Feb 11, 2025 3 minsCareersIT LeadershipSecurityopinionWhat past ERP mishaps can teach CISOs about security platformizationCISOs should study ERP challenges and best practices to pursue a successful transition from security point tools to integrated platforms.By Jon Oltsik Nov 6, 2025 6 minsIT LeadershipIT StrategySecurity PracticesopinionGen AI success requires an AI champions networkTo ensure generative AI competency and use becomes pervasive across the enterprise, CISOs and their colleagues must establish a network of AI champions geared toward team-level practice and business-aligned results.By Tyler Farrar Nov 4, 2025 6 minsArtificial IntelligenceGenerative AIIT StrategyfeatureWhat does aligning security to the business really mean?Security leaders must ensure their security strategies and teams support the organization’s overall business strategy. Here’s what that looks like in practice — and why it remains so challenging.By Mary K. Pratt Nov 3, 2025 8 minsBusiness IT AlignmentIT StrategySecurity PracticesopinionCybersecurity management for boards: Metrics that matterIf your cyber dashboard looks like a tech manual, you’re flying blind. Real leaders measure resilience, not patch counts.By Maman Ibrahim Oct 30, 2025 7 minsAnalyticsNetwork SecurityROI and Metricsnews analysis70% of CISOs say internal conflicts more damaging than cyberattacksCISO-CEO tension and unclear authority under duress are imperiling incident response. CISOs must establish not only clear response plans but also leadership alliances centered on business value, advisors say.By Evan Schuman Oct 28, 2025 4 minsBusiness IT AlignmentIncident ResponseSecurity PracticesfeatureWhy must CISOs slay a cyber dragon to earn business respect?Security leaders and industry experts weigh in on the complex calculus of CISOs’ internal clout.By Evan Schuman Oct 23, 2025 6 minsBusiness IT AlignmentCSO and CISOIncident ResponsefeatureCISOs’ security priorities reveal an augmented cyber agendaTasked with increasing responsibilities and oversight, CISOs are seeking ways to expand cyber capabilities with AI, while piloting new tools, enlisting more partners, and finding ways to stretch their budgets further, according to CSO’s Security Priorities Study.By Esther Shein Oct 21, 2025 11 minsC-SuiteCSO and CISOIT StrategyfeatureCISOs face quantum leap in prioritizing quantum resilienceIndustry progress toward post-quantum cryptography (PQC) remains slow due to uneven prioritization and budget constraints in spite of acknowledged urgency and looming deadline.By John Leyden Oct 17, 2025 7 minsData and Information SecurityEncryptionIT Strategy Show more Show less View all Resources whitepaper From Chat to Agents: Operationalizing AI at Scale For years, enterprise leaders have been told that artificial intelligence would transform the way their organizations work. The post From Chat to Agents: Operationalizing AI at Scale appeared first on Whitepaper Repository –. By Glean 01 Dec 2025Artificial IntelligenceIT LeadershipSecurity whitepaper How a Secure AI strategy helps build resilience and digital trust By PwC (PRICEWATERHOUSECOOPERS LLP) 14 Nov 2025Artificial IntelligenceCyberattacksIT Leadership whitepaper The IT Leader’s Guide to Securing Work from Anywhere By Zscaler 30 Oct 2025IT LeadershipIT ManagementIT Operations View all Video on demand video Creating a multicloud security architecture: IDG’s CIO Think Tank IDG convened 30 senior IT executives as part of our CIO Think Tank Program to explore key opportunities and challenges with multicloud – including security issues IT leaders face in building a true multicloud architecture. Join us as we shed light on problems voiced by these IT executives, explore how savvy IT shops are crafting a cross-cloud security architecture, and discuss how their strategic vendor partners can help ease the burden of multicloud security for their customers. Apr 23, 2021 25 minsCIOIT LeadershipMulticloud Strategies for elevating security to an evergreen business priority Apr 16, 2021 23 mins IT LeadershipRisk ManagementSecurity CIO Leadership Live with Upinder Phanda, CIO of Unisys Jul 1, 2019 52 mins CareersIT Leadership What makes a company a ‘Best Place’ for IT workers? Jun 17, 2019 18 mins CareersIT Leadership See all videos Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryNetwork SecurityPhysical SecurityPrivacyRisk ManagementView all topics Show me morePopularArticlesPodcastsVideos news Fortinet admins urged to update software to close FortiCloud SSO holes By Howard SolomonDec 10, 20254 mins Access ControlIdentity and Access ManagementSingle Sign-on news Making cybercrime illegal won't stop it; making cybersec research legal may By Maxwell CooterDec 10, 20255 mins CybercrimeGovernmentIndustry news analysis Hidden .NET HTTP proxy behavior can open RCE flaws in apps — a security issue Microsoft won’t fix By Lucian ConstantinDec 10, 20256 mins Application SecuritySecuritySoftware Development podcast CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure podcast Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing podcast The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management video CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure video Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing video The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management