IT management

IT management - News, Features, and Slideshows

News about IT management
Features about IT management
  • CSO's CISO Executive Career and Leadership Success Guide

    A lot has changed since the early years, when enterprises first began embracing the CISO position. Back then, the CISO role was primarily a technical one: control user access, secure the databases, find and patch vulnerabilities, keep the malware out, and eventually to help build secure websites and eCommerce platforms. In those days, most of the highly proprietary data resided within the local area network, the data center, or within PCs and notebooks.

    George V. Hulme | 02 Jun | Read more

  • IT careers: Security talent is red-hot

    From the time he was 9, Daniel Kowalski, now 23, knew cybersecurity was going to be his thing. Captivated by the stealth work of hackers in commercials and in his favorite movie, Live Free or Die Hard, Kowalski nurtured his fascination with security from a young age, pursuing multiple IT and security certifications during high school and earning a degree in computer criminology at Florida State University.

    Beth Stackpole | 28 Apr | Read more

  • CIO-CSO tension makes businesses stronger

    The relationship between the CIO and CSO (or CISO) can be fraught with tension - and that can be a good thing. Both executives play a critical role in your organization's C-suite, and better understanding these sometimes overlapping roles can only make your business stronger and more secure.

    Sharon Florentine | 23 Apr | Read more

Whitepapers about IT management

  • Agile Software Development and the Factors that Drive Success

    The digital revolution continues to destroy firms that don’t anticipate market shifts quickly enough to leverage new opportunities and avoid new pitfalls. The need for business agility is driving the Agile movement in software development — and continuous improvement is at the heart of the movement. In this Forrester study, we look at the the intuitive and counter-intuitive data points surrounding the commonly held beliefs about the Agile development tenants that guide the day-to-day behaviour of development team members. Click to download.

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place