What is your number one priority? Imagine if the CIO’s job could be described with that kind of clarity. Well, as a matter of fact, it can be. Corporate boards and the c-suite may not spend too much time thinking about information systems (unless they are an information systems company) but one thing they definitely…Details
When faced with the COVID-19 crisis earlier this year, Adobe’s IT organization, like many others, acted quickly to shift the entire company to a work-from-home situation. For us that meant moving the entire Adobe workforce of more than 22,000 global employees over a single weekend. The pandemic also forced us to focus more critically on…Details
“How should we adapt our cybersecurity controls to address the new WFH reality?” This question is top-of-mind for CIOs and security executives. When it comes to cybersecurity in the post-COVID era, every CIO needs an answer to three key questions: What are the changes in usage patterns and architecture in my IT environment? How do…Details
Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here’s how experts minimized their risk.
Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.(Insider Story)
SAP NetWeaver Application Server Java vulnerability can be exploited without authentication and lead to complete system takeover. Patch now.
The Risk Management Framework (RMF) was developed and published by the National Institute of Standards and Technology (NIST) in 2010 and later adopted by the Department of Defense (DoD) to act as criteria for strengthening and standardizing the risk management process of information security organizations. The framework can be used by nearly any company interested in bolstering…Details
In the information security field, bad actors have the advantage: They play proactive offense while security is generally reactive in defense. To take a more proactive footing, some organizations have been adopting threat intelligence, a security practice that involves sifting through data to identify advanced persistent threats (APTs) before attacks occur. Firms such as Ellie…Details
The decade starting with 2020 is going to be incredible. We will see societal changes like no other time. We are already seeing radical shifts in popular concepts and ideologies. We are seeing the remnants of the old world crumble around us, from the collapsing economic systems around us and pandemic to civil unrest rivaling the civil unrest of the 60’s and 70’s.Details
These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.