Kachina Shaw

Kachina Shaw

Latest content from Kachina Shaw

The Internet of Things Touching IT and Non-IT Careers

23 Jul, 2014

New skill sets and new jobs go far beyond data analysis. Think networking, systems management, customer service, executive leadership and more.

...More >

Data Breach Damage from NY’s POV: Over 1 Billion in 2013 Alone

17 Jul, 2014

The New York Attorney General's office attempts to illustrate the exponential growth in breaches, reports of breaches and some of the related costs.

...More >

How to Get over the Fear of Negotiating for a Raise

15 Jul, 2014

It's not all-or-nothing, so preparation and a willingness to ask more than once can build confidence and lead to success.

...More >

Overcoming Barriers to Successful Negotiation

15 Jul, 2014

Author Eldonna Lewis-Fernandez says we can learn to master negotiation by thinking of it like a game.

...More >

Can Internet of Things and Privacy Co-Exist?

10 Jul, 2014

Governmental regulation can't keep up with the pace of development. If it could, would it be effective?

...More >

In High Demand, CISOs Need Boardroom Skills to Succeed

08 Jul, 2014

Many companies are searching for a CISO for the first time, which means candidates both need to ask pointed questions and have the opportunity to create the position.

...More >

BYOD Can Threaten More Than Network Security

03 Jul, 2014

BYOD creates less quantifiable problems for IT and the rest of the user base, including job loss fears, worry about increased working hours and uncertainty about security issues.

...More >

Enhance Documentation with Video

01 Jul, 2014

Documentation is often discussed, sometimes started and often never finished. Adding video elements to the process can speed it up and simplify it, in some cases.

...More >

How to Avoid Creating Extra Work in Compliance Efforts

26 Jun, 2014

IT organizations can easily make mistakes that create more work before, during and after audit requests.

...More >

What Millennials Want at Work

23 Jun, 2014

Millennials want lots of flexibility and fast rewards at work, but they also want to do good. Companies can work with these desires as their numbers grow.

...More >

ACL’s Free Download to Improve Auditing Work in Excel

19 Jun, 2014

An Excel Add-In tool may help compliance teams that find themselves doing the forbidden: Working in Excel.

...More >

Post-Breach, Target Hires First CISO

16 Jun, 2014

Experts say that the hiring of the CISO is too little, too late, and that he should report directly to the CEO in order to be effective. He will report to the CIO.

...More >

Risk Managers Consider Responses to Emerging Risks

12 Jun, 2014

As a risk classified as emerging, cybersecurity is changing both short-term and long-term planning.

...More >

Emerging Cyber Risks on the Minds of Risk Managers

10 Jun, 2014

The seventh annual Emerging Risks Survey results show what's behind the trend toward increased focus on cyber security risks among risk professionals.

...More >

Brand Protection: Follow Bad Guys to Mobile Apps, Paid Search

05 Jun, 2014

They move quickly, but you can count on the fact that parties actively infringing on and threatening your organization's brand are targeting mobile apps and paid search.

...More >

Cloud Startup Zenefits Aims to End HR Headaches

03 Jun, 2014

The firm is getting attention not only for its speedy funding rounds, but for its approach to making HR make more sense for small and mid-sized businesses.

...More >

IT Professionals Have New Privacy Certification Available

29 May, 2014

The new certification is appropriate, says the IAPP, for both IT professionals and others within the security communication community.

...More >

IAPP’s New Privacy Certification Addresses Emerging Landscape

27 May, 2014

New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.

...More >

Researching Your Potential New Manager

23 May, 2014

Asking for references for your potential new manager can make you stand out, in a good way.

...More >

U.S. Utility Attacked Through Internet Accessibility

22 May, 2014

The control system of a U.S. utility was accessed through a remote access feature and brute-force tactics applied to the password authorization mechanism.

...More >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data