Remove 2020 Remove Information Security Remove Program Management Remove Programming
article thumbnail

3 key roles for driving digital success

CIO Business Intelligence

As such, organizations must evolve their digital strategies with market changes, such as the shift to remote work in 2020, the evolution to hyperautomation in 2022, and how generative AI will now require CIOs to overhaul their roadmaps. Information security specialists guide agile teams on shift-left security practices.

Agile 98
article thumbnail

New CIO appointments in India, 2022

CIO Business Intelligence

Prior to joining Fractal, Tiwari was senior vice-president and global CISO at Airtel, where he set up the managed security services initiative Airtel Secure for Business. Before that, he was the chief information security advisor at Microsoft India. . New CIO appointments in India, 2020. November 2020.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

” In addition to the SolarWinds software supply chain attacks that first emerged in late 2020, the company says it saw increases of 150% in ransomware and more than 600% in phishing last year, plus password attacks at a rate of 579 per second. Microsoft says it’s fighting “an asymmetric battle in unprecedented times.”

Microsoft 107
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. Second point, there are many, many different kinds of bug bounty programs. I started in journalism.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. Second point, there are many, many different kinds of bug bounty programs. I started in journalism.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. Second point, there are many, many different kinds of bug bounty programs. I started in journalism.