How to Become a Chief Information Officer: CIO Cheat Sheet

How to Become a Chief Information Officer: CIO Cheat Sheet

Business leaders are responsible for guiding a company and its employees toward successful goals. To accomplish this, leaders must hire the best candidates to support their staff. But the responsibilities don’t stop there. Most big changes in organizations begin at the top: diversity and inclusion efforts, innovation initiatives, mentorship programs, upskill and reskill prioritization, cybersecurity procedures, and overall goal assessment. These movements are typically set by those in the C-suite and implemented by other executives…

Read More

Can Security Experts Leverage Generative AI Without Prompt Engineering Skills?

Can Security Experts Leverage Generative AI Without Prompt Engineering Skills?

Professionals across industries are exploring generative AI for various tasks — including creating information security training materials — but will it truly be effective? Brian Callahan, senior lecturer and graduate program director in information technology and web sciences at Rensselaer Polytechnic Institute, and Shoshana Sugerman, an undergraduate student in this same program, presented the results of their experiment on this topic at ISC2 Security Congress in Las Vegas in October. Experiment involved creating cyber training…

Read More

Cyber Security and IT Leadership: A Growing Threat to Australia’s Renewable Energy Efforts

Cyber Security and IT Leadership: A Growing Threat to Australia’s Renewable Energy Efforts

Australia is on a mission to become a more energy-efficient nation. The Australian Renewable Energy Agency recently announced a $100 million initiative to explore and expand solar energy capabilities. Further investments in energy storage, pumped hydro, and low-carbon grids may prove just as significant. However, the nation must also address an underlying challenge: the integration of robust IT and software foundations within the OT environments that run the grids. Without these, Australia could struggle to…

Read More

The Australian Government’s Manufacturing Objectives Rely on IT Capabilities

The Australian Government’s Manufacturing Objectives Rely on IT Capabilities

In recent weeks, the Australian government has announced several objectives and initiatives that are intended to drive towards a single outcome: a far more robust local manufacturing industry. For Australia to be able to achieve this, it’s going to need a highly capable and equally well-resourced IT sector working in the manufacturing sector. The Australian government earmarks nation-building levels of investment The Future Made in Australia Act has yet to be fully detailed, but as…

Read More

Red Hat: UK Leads Europe in IT Automation, But Key Challenges Persist

Red Hat: UK Leads Europe in IT Automation, But Key Challenges Persist

The U.K.’s position as a financial services hub puts it ahead in enterprise-wide IT automation, says Red Hat. But skills shortages remain an issue for all IT leaders surveyed. More than a quarter of U.K. businesses have automated IT processes across the organization, according to a new survey from Red Had — putting them ahead of their European counterparts in Germany (18%), Spain (16%) and France (12%). Red Hat’s report, Thriving through change with enterprise-wide…

Read More

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Stay-at-home orders during the Covid-19 pandemic spurred new cloud computing and remote-technology setups, increasing company exposure to hackers. As a result, some corporate cybersecurity chiefs are also taking on the leadership role for all of information technology. Oversight of both groups isn’t an easy line to walk.  Having spent years in general IT, these chief information security officers understand the cyber risks of an increasingly far-flung tech infrastructure, said Lucia Milică Stacy, global resident CISO…

Read More

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Relentless cyberattacks and pressure to fix security gaps despite budget constraints are raising the stress levels of corporate cyber leaders and their worries about personal liability, a growing concern since the criminal case against Uber Technologies ’ former security chief. Hacks on companies’ IT systems often come with business disruptions, reputational damage, regulatory investigations and lawsuits. Chief information security officers must manage cybersecurity risks and, at the same time, educate C-suite colleagues and the board….

Read More

Faith Roy named Deputy CISO at US Department of Veterans Affairs

Faith Roy named Deputy CISO at US Department of Veterans Affairs

Faith Roy named Deputy CISO at US Department of Veterans Affairs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Justin DePalmo named VP, CISO at GDIT

Justin DePalmo named VP, CISO at GDIT

Justin DePalmo named VP, CISO at GDIT | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

IC3 issues warning on deepfake use in remote work applications

IC3 issues warning on deepfake use in remote work applications

<!– IC3 issues warning on deepfake use in remote work applications | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More
1 2 3