Skip to main content
Home
Our ContributorsAbout
 
  • App Dev & Testing

    Get up to speed fast on the techniques behind successful enterprise application development, QA testing and software delivery from leading practitioners.

    View all   
    Long exposure nightime photograph of burning steel wool swung in an infinity pattern
    Close the infinite loop

    How to move beyond shift left, to shift 360

    Ariel photograph of high rise building pushing through clouds
    Lofty intent

    Building secure and compliant cloud-first infrastructure

    View of London with  old, derelict buildings in foreground and tall, modern, shiny skyscraper behind.
    Old to new

    Securing your application modernization process

    Snearing white and brown short coated small dog
    Work together

    How to embrace secure software development practices

    Complicate Javascript source code
    Keep it simple, stupid

    5 principles for 'stupidly brilliant' JavaScript apps

  • Enterprise IT

    Trends and best practices for provisioning, deploying, monitoring and managing enterprise IT systems. Understand challenges and best practices for ITOM, hybrid IT, ITSM and more.

    View all   
    Trendy grandmother with skateboard
    Admiral Hopper probably wouldn’t be shocked

    It’s not your grandmother’s COBOL

    Hand reaching for the clouds
    Reach for the cloud

    5 tips for tackling cloud migration

    White sail boat, tacking into the headwind, on a body of water.
    Keep out of the doldrums

    Tacking into business headwinds with digital transformation

    Male dancer in arieal spin, demonstrating flexibility
    In praise of flexibility

    What extensibility means to business efficiency and innovation

    High rise office building reaches up toward a cloudy sky
    Reach for the sky

    Mainframe applications are going hybrid

  • Security

    All things security for software engineering, DevOps, and IT Ops teams. Stay out front on application security, information security and data security.

    View all   
    Photo of black wooden door in stone wall with employees craved into the lintal above door
    Weakest link no more

    Empowering employees can change the security dynamic

    Heart rate sensor circuit
    When things attack

    Lives, property, economies, and the IoT risk

    Security guard in yellow and black jacket on street
    Relative risk

    CISOs: Think strategically to beat the bad guys

    A rolled and banded copy of The New York Times with President Joe Biden on the front page
    Strategies for success

    How to meet US federal guidelines for application security

    Grey storm clouds
    Stormy, with a chance of breach

    Privacy, AI, and automation in the multi-cloud era

  • GUIDES

    TechBeacon Guides are collections of stories on topics relevant to technology practitioners.

    View all   
    Data masking has morphed from simple...

    TechBeacon Guide: Data Masking for Privacy and Security

    Increasingly, companies are moving...

    TechBeacon Guide: Cloud Security & Data Privacy

    Find out why your data security...

    TechBeacon Guide: Unstructured Data Security

    TechBeacon’s in-depth analysis of the...

    TechBeacon Special Report: National Vulnerability Database Analysis

    Big shifts are under way with...

    TechBeacon Guide: Application Security Tools 2021

  • CONFERENCES

    Discover and register for the best 2021 tech conferences and webinars for app dev & testing, DevOps, enterprise IT and security.

    View all   
    About this webinarFederal agencies...

    Webinar: Cybersecurity Executive Order Challenges and Strategies

    As IT workloads transition to the...

    Webinar: Securing Transitions of Workloads to the Cloud

    About this webinarEnterprises have...

    Webinar: Data Privacy and CIAM—Complete Your Identity Stack

    About this webinarMany organizations...

    Webinar: App Sec in a Cloud-First Culture

    About this webinar:Software...

    Webinar: How to Shift Dynamic App Sec Testing Left

Subscribe
Home
  • Our Contributors
  • About
Subscribe
  • App Dev & Testing
  • Enterprise IT
  • Security
  • Guides
  • Conferences
  • Our Contributors
  • About
Subscribe
Guides
Conferences

About Jadee Hanson

Jadee Hanson
CIO and CISO
Code42
3 articles

Jadee Hanson is the Chief Information Security Officer and Chief Information Officer at Code42, where she is responsible for business technology strategy and purchasing and leads global risk and compliance, security operations, incident response and insider risk programs. Prior to Code42, Jadee held senior leadership roles in security at Target Corporation, where she implemented compliance, risk management, and insider threat programs. She also served as the security lead for the sale of Target Pharmacies to CVS Health. Before Target, Jadee was a security consultant at Deloitte. Jadee also co-authored the book, Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can’t Ignore, and in addition to her day job, Jadee is the founder and CEO of the non-profit organization Building Without Borders.

  • Recent
  • Popular
Marshall amplifer
Insider risk is amplified to 11 during milestones such as IPOs or M&As. Code42's Jadee Hanson has some strategies to help you prioritize data...
Jadee Hanson
Jun 6, 2022
Embrace data protection throughout your company’s lifecycle
Risk amped to 11
Your organization can be both innovative and secure, if you're willing to take the right steps. Focus on the data rather than the tools for starters.
Jadee Hanson
Feb 25, 2020
Stop saying no: Why data sharing is a good thing (really)
How security can be the department of yes

Subscribe to TechBeacon

Get the best of TechBeacon, from App Dev & Testing to Security, delivered weekly.

SUBSCRIBE
Know the signs of organizational breach fatigue so you'll be prepared to respond effectively when it occurs. It happens more often than you might...
Jadee Hanson
May 24, 2019
The dangers of breach fatigue—and how to take action
How's your security engagement?
Show More

Home

Brought to you by
HP

Topics

  • App Dev & Testing
  • Enterprise IT
  • Security
  • GUIDES
  • CONFERENCES

TechBeacon

  • About
  • Our Contributors
  • Terms of Use
  • Privacy
Cookie Privacy Manager

Subscribe to TechBeacon

Get the latest delivered straight to your inbox.

What topics interest you?

I'd like to receive emails from TechBeacon and Micro Focus to stay up-to-date on products, services, education, research, news, events, and promotions.

Sign up

Thanks for subscribing!

Check your email for the latest from TechBeacon.

© Copyright 2015 – 2022 Micro Focus or one of its affiliates
Back to top