The Australian Government’s Manufacturing Objectives Rely on IT Capabilities

The Australian Government’s Manufacturing Objectives Rely on IT Capabilities

In recent weeks, the Australian government has announced several objectives and initiatives that are intended to drive towards a single outcome: a far more robust local manufacturing industry. For Australia to be able to achieve this, it’s going to need a highly capable and equally well-resourced IT sector working in the manufacturing sector. The Australian government earmarks nation-building levels of investment The Future Made in Australia Act has yet to be fully detailed, but as…

Read More

Red Hat: UK Leads Europe in IT Automation, But Key Challenges Persist

Red Hat: UK Leads Europe in IT Automation, But Key Challenges Persist

The U.K.’s position as a financial services hub puts it ahead in enterprise-wide IT automation, says Red Hat. But skills shortages remain an issue for all IT leaders surveyed. More than a quarter of U.K. businesses have automated IT processes across the organization, according to a new survey from Red Had — putting them ahead of their European counterparts in Germany (18%), Spain (16%) and France (12%). Red Hat’s report, Thriving through change with enterprise-wide…

Read More

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Stay-at-home orders during the Covid-19 pandemic spurred new cloud computing and remote-technology setups, increasing company exposure to hackers. As a result, some corporate cybersecurity chiefs are also taking on the leadership role for all of information technology. Oversight of both groups isn’t an easy line to walk.  Having spent years in general IT, these chief information security officers understand the cyber risks of an increasingly far-flung tech infrastructure, said Lucia Milică Stacy, global resident CISO…

Read More

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Relentless cyberattacks and pressure to fix security gaps despite budget constraints are raising the stress levels of corporate cyber leaders and their worries about personal liability, a growing concern since the criminal case against Uber Technologies ’ former security chief. Hacks on companies’ IT systems often come with business disruptions, reputational damage, regulatory investigations and lawsuits. Chief information security officers must manage cybersecurity risks and, at the same time, educate C-suite colleagues and the board….

Read More

Faith Roy named Deputy CISO at US Department of Veterans Affairs

Faith Roy named Deputy CISO at US Department of Veterans Affairs

Faith Roy named Deputy CISO at US Department of Veterans Affairs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Justin DePalmo named VP, CISO at GDIT

Justin DePalmo named VP, CISO at GDIT

Justin DePalmo named VP, CISO at GDIT | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

IC3 issues warning on deepfake use in remote work applications

IC3 issues warning on deepfake use in remote work applications

<!– IC3 issues warning on deepfake use in remote work applications | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

10% of IT leaders believe they can stop an advanced attack

10% of IT leaders believe they can stop an advanced attack

<!– 10% of IT leaders believe they can stop an advanced attack | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

The state of enterprise password management

The state of enterprise password management

<!– The state of enterprise password management | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

What are national security professionals getting paid?

What are national security professionals getting paid?

<!– What are national security professionals getting paid? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2