2017 IT Priority Study: Trends in the EMEA security market

Computer Weekly

Find out what security initiatives IT decision makers are planning in 2017

Study 124

2017 IT Priority Study: Trends in APAC security

Computer Weekly

Find out what security initiatives IT decision makers are planning in 2017

Study 116

Forrester Predictions: Ten Key Developments In Cloud Computing Shape The Industry In 2017

Forrester IT

I'm pleased to announce that Forrester's cloud computing predictions for 2017 published this morning! Check out Predictions 2017: Customer-Obsessed Enterprises Launch Cloud's Second Decade. Our cloud team has gathered ten key developments in cloud computing that will shape this industry in 2017 -- and what you should do about them today. Starting in 2017, large enterprises will move to cloud in a big way, and that will super-charge the market.

Six Trends in Cloud Security for 2017

IT Toolbox

This makes cloud security critical, since it interfaces with just about every computing system. Almost no IT system is safe without good cloud security. The cloud is the starting point for most computing now. That’s why hackers are increasing targeting cloud systems—taking advantage of its centrality in the computing stack, and the vulnerabilities that come from its newness. Thankfully

Trends 125

Top ERP Security Challenges in 2017

IT Toolbox

There’s more opportunity in hacking business. Whether for mayhem or financial gain, cybercriminals are switching from attacking unsuspecting individuals to more organized cyber crime that targets businesses large and small. ERP, in particular, is a prime target. That’s because ERP systems are the nerve center of the businesses that use them, and unauthorized access

The 3 hottest cloud jobs for 2017

David Linthicum

Here’s my list of the three top cloud jobs for 2017 in terms of demand, pay, and job security. I get this question a lot: What’s the best cloud job this year? Followed by: Which cloud jobs pay the best? The same answer—data—applies to both questions, though with three variations. Download the public cloud megaguide PDF: Amazon, Microsoft, Google, IBM, and Joyent compared. Stay up on the cloud with InfoWorld’s Cloud Computing Report newsletter. ]. Cloud architect.

IBM 190

Computer science student wins 2017 UK Cyber Security Challenge

Computer Weekly

Cyber attack simulation challenge sees 22-year-old computer science student crowned UK amateur cyber security champion

Hiring cyber security and big data experts named top priority for IT recruiters in 2017

Computer Weekly

Research suggests IT professionals with expertise in cyber security and big data could find themselves in high demand in 2017

Hot products at VMworld 2017

Network World

VMworld 2017 Image by Thinkstock/VMware VMworld 2017 is underway in Las Vegas, where IT pros are converging to learn about the latest in enterprise cloud, virtualization, security, and software-defined data center technologies.

Vmware 103

Seven Trends and Predictions for 2017

CTOvision

Seven Trends and Predictions for 2017. With that in mind, here are my on-the-record predictions for 2017. Prediction: Self-driving cars will complete trials in 2017. Prediction: Internet of Things will move off the hype list and become a dominant technology in 2017.

Trends 151

Bigger, Faster, Stronger: VoIP Outlook in 2017

IT Toolbox

The increased need for security, speed and better communication is fueling the evolution of voice over Internet protocol services. Here's what to expect for VoIP in 2017 and beyond: 1. Heightened Security Measures. Cyber-attacks and data breaches have all become too common. In fact, the past decade has seen more than

VOIP 136

2 cloud tasks to do before 2017 ends

David Linthicum

But there are two things you must do before 2017 is over. Think security—yes, again. When considering the public cloud, security should be systemic to everything you do. However, most enterprises moving to cloud have no real definition of their security strategy, not to mention policies or the selection of enabling technology. Vacations are over, school is about to start, and people are starting to think about what to do in the four months until the end of the year.

Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. to “Am I using the cloud securely?”

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Cyber InfoSec education infosec security awareness tools training

Cyber security a business necessity

Computer Weekly

Cyber security is a business necessity, according to the T-Mobile security chief in Poland

Mobile 204

AWS cloud security: Amazon CISO shares secrets to building secure cloud products

Computer Weekly

Ahead of Re:Invent 2017, AWS CISO Stephen Schmidt discusses how the cloud giant addresses user demand for new products and services, without compromising on cloud security

Cyber attacks in 2017 drive Nordic security efforts

Computer Weekly

The volume of cyber attacks last year has increased boardroom focus on security in the Nordic region

Security Serious Week summit goes virtual

Computer Weekly

The third annual Security Serious Week in October 2017 will feature an entirely virtual conference, accessible to anyone who is online

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

Endpoint Security in 2017

Network World

Fast forward to 2017 and my colleague Doug Cahill and I are currently tracking around 50 endpoint security vendors. to throw VC dollars at anything that hinted at endpoint security innovation. Okay, I get the need for more than signature-based AV but there simply isn’t room in the market for 50 endpoint security vendors. Just a few years ago, there were about 6 to 10 well regarded AV vendors that dominated the market.

Stuff Worth Reading – November 2017

The Investing Edge

In Innovation That Matters 2017 , sponsored by the U.S. And Tom Spring at Threat Post quotes security experts as saying the IoT can’t be secured, but it can be tamed. And if you can make some time to read, Strategy + Business offers their Best Business Books 2017–In Pictures. The post Stuff Worth Reading – November 2017 appeared first on Ascent Venture Partners.

WannaCry biggest incident to date for National Cyber Security Centre

Computer Weekly

The WannaCry ransomware attack that started on 12 May 2017 is the biggest single incident that the new UK National Cyber Security Centre (NCSC) has faced

Autonomous Capabilities for DoD Summit 26-26 Sep 2017

CTOvision

On September 26-27, 2017, senior leaders within the U.S. CTO Cyber Security News RobotsMilitary Services, DoD, Industry and Academia will convene in Alexandria, VA, for two days of off the record, non attribution briefings and senior level discussions at Defense Strategies Institute’s “Town Hall” Autonomous Capabilities for DoD Summit. The dialogue will focus on achieving and applying levels of […].

Pay rises tipped for IT security and data analysis roles in 2017

Computer Weekly

Increase in high-profile data breaches and the need for data insight are seen as contributory factors in salary rises for IT security and data analytics staff

Birmingham SMEs to get help from London Digital Security Centre

Computer Weekly

SMEs in Birmingham are to get the opportunity to learn how to protect themselves from cyber attacks at a free event on 25 October 2017

Stuff Worth Reading – October 2017

The Investing Edge

Gartner has cited a 1 million talent shortage for security roles. Here’s how Sentara Healthcare is building a pipeline of cybersecurity talent : recruit part-time or intern students from universities and high schools and have them work alongside your internal security team or MSSP. Hear from our esteemed panelists from LogMeIn , PTC , Cisco , Carbonite , and Aqua Security on how to navigate that startup-corporate relationships.

Retail 100

First cyber security startups graduate from GCHQ accelerator

Computer Weekly

The first group of companies has completed a government-led cyber accelerator programme aimed at helping UK startups take the lead in producing the next generation of cyber security systems, with another round to be announced in 2017

Security Innovation Network Gathering Innovators and Enterprise Leaders at 28-29 March 2017 ITSEF

CTOvision

CTO Cyber Security EventsBob Gourley. Hosted at the Computer History Museum, Mountain View, CA, this event gathers over 300+ leading private equity investors, corporates, venture-back tech companies and emerging growth businesses. The cyber innovation ecosystem is broadening.

Centralized security in the cloud is the best security model

David Linthicum

You get an automated text from your security systems that a DDOS attack was attempted, but new security policies downloaded several hours earlier proactively protected the systems from the attacking IP address. The alternative is not good—meaning that you had no idea of the DDOS attack, and now you’re playing cloud security whack-a-mole to fend off the attack until you can put more permanent solutions in place. It’s 6:00 a.m. on a Monday morning.

RSA 2017: The Internet of Things security threat

Network World

RSA Conference 2017 will take on the threat posed by the internet of things, something that was demonstrated last fall by the DDoS attacks that took down Dyn data centers and many of the high-profile Web sites it supports. Those attacks, generating peak traffic of 1TByte or more, raise the question of how best to secure these devices, and sessions at the Feb.13-17 conference in San Francisco try to answer it.

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery

CEB IT

10 Ways Digitalization is Upending Information Security. A recent survey of around two dozen heads of information security produced a useful overview of the nature of this problem and how some of the world’s most forward-thinking teams are responding.

Will The RSA Conference 2017 Make You A Better Security Pro?

Forrester IT

Coincidentally, I'm proud to announce a new report highlighting the best tactics CISOs and security leaders are using to elevate their game: How To Become A Superstar Security Leader. If you're interested to hear Forrester's take on the most interesting things we hear at the conference, register for our webinar here: Top Security Trends From The RSA Conference 2017. Security and Risk

Trump’s cyber security executive order delayed

Computer Weekly

It is not yet clear when US president Donald Trump will sign an eagerly-awaited executive order on cyber security that was scheduled to take pace on 31 January 2017

O’Reilly Security Conference NY Oct 29-30 2017

CTOvision

The O'Reilly Security Conference brings together in-the-trenches security practitioners from organizations of every size, across a wide breadth of industries to share actionable insight in a supportive, hype-free environment. Big Data CTO Cyber Security Events News

Exploit leaks are a cyber security game changer, says Kaspersky Lab

Computer Weekly

Leaked exploits became the game changer of the cyber threat landscape in the second quarter of 2017, say security researchers