article thumbnail

Tech Moves: Nordstrom names chief information security officer; Meta research scientist joins AI2

GeekWire

Nordstrom Photo) — Nicole Ford joined Nordstrom as chief information security officer. Ford previously served as vice president and CISO at Rockwell Automation, with past experience leading security transformation initiatives and developing cybersecurity programs. Nicole Ford.

article thumbnail

The Small Business Guide to Information Security

Galido

Information Technology Blog - - The Small Business Guide to Information Security - Information Technology Blog. Information security is a major issue in the business world, and security breaches cost businesses millions of dollars per year. Have the Talent in House, or Develop it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The early returns on gen AI for software development

CIO Business Intelligence

Generative AI is already having an impact on multiple areas of IT, most notably in software development. Still, gen AI for software development is in the nascent stages, so technology leaders and software teams can expect to encounter bumps in the road.

article thumbnail

How Your Product Team Can Integrate Security Throughout Software Development Lifecycles

CTOvision

Read Harshit Agarwal explain how you can integrate security throughout software development lifecycle on Information Security Buzz : Integrating security into DevOps to deliver DevSecOps is no easy task: It requires changing the team’s mindset, processes, and technology.

article thumbnail

CSO30 Awards: Introducing the top 30 security leaders in the UAE

CIO Business Intelligence

Aisha Alhemeiri, Head of Cybersecurity, Department of Community Development 3. Ali Alkaf Alhashmi VP, Cyber Security & Technology, Mubadala Investments 4. Anoop Paudval Head of Information Security and Governance Gulf News, Al Nisr Publishing 5. Ayoub Fathi, Vice President of Information Security, CISO noon 7.

Security 105
article thumbnail

IDG Contributor Network: Cyber crime as a service forces changes in information security

Network World

Just use Google to learn how to access the Dark Web, and you can find hackers who, for a price, are more than happy to write malware, create highly effective spear phishing campaigns and develop bogus websites for harvesting login credentials. Also on Network World: DDoS-for-hire services thrive despite closure of major marketplace +.

article thumbnail

Security Top IT Investment Priority in 2023

Information Week

Chief information security officers must develop a comprehensive security investment strategy that considers human capital, even while qualified IT security professionals are in short supply.

Security 206