InformationWeek Security
Strategies for Risk Leaders; States With Most Data Leaks; Creating a Data Governance Strategy

View in Browser
InformationWeek Security
February 20, 2025

Hottest Places to Find a Tech Job
What Tech Workers Should Know About Federal Job Cuts and Legal Pushback
Job cuts are impacting swaths of government employees in IT and beyond. What is the outlook on this upheaval and the resulting lawsuits?

Continue Reading

 

TOP STORIES


Risk Leaders: Follow These 4 Strategies When Transitioning To Continuous Risk Management

An ineffective risk program is riskier than you think and holds organizations back from success. Continuous risk management aligns risk with business goals, helping teams anticipate and adapt to risks effectively.
Read More

Data Leaks Happen Most Often in These States — Here's Why

State-led data privacy laws and commitment to enforcement play a major factor in shoring up business data security, an analysis shows.
Read More

How to Create a Sound Data Governance Strategy

Data governance is essential for compliance, privacy, security, reliable data analytics and AI, but many organizations are still struggling with it.
Read More

TECH RESOURCES


WHITE PAPERS


ONLINE EVENTS

Learn More
 
Hottest Places to Find a Tech Job
SolarWinds CEO on $4.4B Acquisition, Calming Uncertainty, and Securing the Future
The company’s plan to go private worries some cybersecurity experts, who say the move may lead to less transparency. Not so, says SolarWinds CEO Sudhakar Ramakrishna. Read More
Hottest Places to Find a Tech Job
11 Ways Cybersecurity Threats are Evolving
The cybersecurity threat landscape is getting bigger. InformationWeek takes a look at how security and threats are evolving. Read More
Hottest Places to Find a Tech Job
9 Ways CISOs Can Stay Ahead of Bad Actors
Security leaders are expected to defend their organizations against existing and emerging threats. Here are some tactics they can use to crack down on the enemy. Read More
Hottest Places to Find a Tech Job
10 Ways Employees Are Sabotaging Your Cybersecurity Stance
Following are some ways, whether intentional or not, employees can undermine cybersecurity and some advice on how to handle each scenario. Read More
InformationWeek Security
facebook twitter rss linkedin
InformationWeek Operated by TechTarget, Inc.
and its subsidiaries, | 275 Grove Street, Newton,
Massachusetts, 02466 US

Contact Us | Privacy Policy | Unsubscribe
Copyright © 2025 TechTarget, Inc. or its subsidiaries.
All rights reserved.