Stacy Collett

Contributing Writer

Stacy Collett is a contributing writer for Computerworld, CSO, and Network World, covering a variety of security and risk issues.

That online job candidate may be carrying a virus

That online job candidate may be carrying a virus

LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by...

How to improve your security grade in 2017

How to improve your security grade in 2017

Many security professionals feel less than certain about their own cyber defenses. Research firm CyberEdge Group and Tenable Network Security asked 700 security practitioners in nine countries and across seven industry verticals about...

Companies increasingly looking for hackers to attack their networks

Companies increasingly looking for hackers to attack their networks

As its ‘bad guy’ stereotype wanes, hacker job postings in the enterprise jump 700% in three years.

Best small to midsized cities to land a cybersecurity job

Best small to midsized cities to land a cybersecurity job

These are the best small to medium-sized cities for landing a job in the security sector, according to CyberSeek, a new data-driven heat map from CompTIA that provides real-time insight on the cybersecurity job market.

Is your IT staff ready for IoT?

Is your IT staff ready for IoT?

Organizations are itching to start internet of things initiatives, but their efforts are hampered by shortages of already-scarce security pros and workers with newer analytics skills.

Rise of the IoT machines

Rise of the IoT machines

Who is responsible for preventing DDoS attacks involving IoT devices?

5 ways to better survey IT employees

5 ways to better survey IT employees

To keep employees’ unhappiness from reaching a tipping point, companies are turning to more frequent surveys to gauge the mood of their staffers, thanks to a slew of new survey and collaboration tools that make pulse-taking easier.

Five tips for protecting your brand on social media

Five tips for protecting your brand on social media

This summer, online payment service giant Paypal learned that bad guys had set up a fake Paypal Support page on Twitter, and then monitored the real Paypal Support page for remarks from customers. The bad guys responded to those...

Navigating the muddy waters of enterprise infosec

Navigating the muddy waters of enterprise infosec

Information security finally has executives’ attention, but aligning with business needs is still challenging.

Five social engineering scams employees still fall for

Five social engineering scams employees still fall for

You’ve trained them. You’ve deployed simulated phishing tests. You’ve reminded your employees countless times with posters and games and emails about avoiding phishing scams. Still, they keep falling for the same ploys they’ve been...

Can cybersecurity save the November elections?

Can cybersecurity save the November elections?

Cyber pros weigh in on how to protect voter databases and the election process.

Tips for scaling up a data analytics project

Tips for scaling up a data analytics project

Four innovation leaders share their adventures in scaling an analytics infrastructure to back up business-critical decisions with hard data.

What’s in a security score?

What’s in a security score?

In May, FICO upped its own scoring game. It acquired cybersecurity firm QuadMetrics to create its own brand of enterprise security scores for enterprises. The new scoring tool, available in August, uses predictive analytics and...

How to attract a board-level cybersecurity expert

How to attract a board-level cybersecurity expert

Suzanne Vautrinot’s impressive cybersecurity experience has been in high demand since she retired from the U.S. Air Force in October 2013. As a major general and commander, she helped create the DoD's U.S. Cyber Command and led the...

Why legal departments begrudge the cloud

Why legal departments begrudge the cloud

Legal professionals are by their nature a skeptical and cautious lot, but the sharp rise in cloud-based applications being used by enterprises and law firms, as well as recent high-profile law firm security breaches, has many legal...

Companies high on virtualization despite fears of security breaches

Companies high on virtualization despite fears of security breaches

While no one thinks security problems will go away, companies are willing to tolerate the risk in the name of agility, flexibility and lower costs.

Should your board of directors include a cybersecurity expert?

Should your board of directors include a cybersecurity expert?

The pros and cons of proposed legislation to identify a board’s cybersecurity pro.

Why your network admins are nervous

Why your network admins are nervous

Network pros know that SDN promises to rock their world. But those who prepare for the change will find new opportunities. Here’s how to help your staffers keep their skills ahead of the curve.

Why any organization can suffer a healthcare breach

Why any organization can suffer a healthcare breach

Industry professionals say that companies should identify where PHI data is hiding in their organization and take steps to lock it down.

IT careers: How to get a fair performance review

IT careers: How to get a fair performance review

You’re killing it at work, but does anyone notice? A large percentage of IT professionals say the answer is no. Here’s why.

Load More