Remove page e
article thumbnail

How CIOs Work With Their Board Of Directors (a chief information officer needs an IT strategy to create IT alignment)

The Accidental Successful CIO

First off, let’s all make sure that we’re on the same page here – do you know exactly what your company’s Board Of Directors is? Although the Board does understand the importance of information technology, they really don’t care about the IT department – they have much bigger things to worry about.

Strategy 100
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

.” That warning, so obvious today, was a blunt wake-up call 20 years ago for many of the software developers reading the book Writing Secure Code, by Microsoft security engineering leaders Michael Howard and David LeBlanc. Bill Gates was one. Bell, 64, is a native of Irvine, Calif.,

Microsoft 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Putin Advisor: 'Military Activities in Cyberspace Are in Full Swing'

SecureWorld News

Security researchers believe that Russian hackers were not only responsible for the SolarWinds incident—which left thousands of organizations and government agencies vulnerable to cyberattacks—but they are also responsible for other ransomware attacks on critical infrastructure. But we have to anticipate their next moves.

article thumbnail

Cloud Shines Brightly as Future of Disaster Response IT

Cloud Musings

The disaster proved the cloud’s ability, efficiency and advantages in emergency response on a national basis,” Ben Katsumi, chief researcher, Information-Technology Promotion Agency, Japan, concluded in a 2013 presentation at CloudScape V. Unlike an office e-mail server, most disaster response IT isn’t in. Focus on Security.

Cloud 182
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

They spent that time researching and understanding the environment. So it wasn't this story that we hear sometimes thrown around about Lightspeed net speed cyberattacks, you know it was human adversaries doing research on the environment, so the attack starts. When they did that. So it was there was times when we when we were worried.

System 52