article thumbnail

Cognitio’s Roger Hockenberry Cited in BizTechReports

CTOvision

In the aftermath of high-profile data breaches at Sony, Target and Home Depot, chief information officers (CIOs), chief information security officers (CISOs) and other IT security professionals both in government and the private sector are playing from behind. . All three were really good, viable companies.

article thumbnail

3 certification tips for IT leaders looking to get ahead

CIO Business Intelligence

Saurabh Chandra, managing director at Boston Consulting Group, says, “Enterprises today demand customized solutions to meet their specific business needs. Mehta earned a Certified Information Security Auditor certification in 2002 when, he says, “there were only 1,600 such certified professionals globally.”

Insurance 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New CIO appointments in India, 2022

CIO Business Intelligence

Roopesh Pujari has been promoted to CTO at marketing and advertising firm Publicis Groupe India. Prior to joining Fractal, Tiwari was senior vice-president and global CISO at Airtel, where he set up the managed security services initiative Airtel Secure for Business. Nitin Mittal joins Zee Entertainment Enterprises.

article thumbnail

Savvis Announces Availability of Rebuilt Cloud Data Center » Data.

Data Center Knowledge

and Cisco’s Unified Data Center technologies, it’s aimed at enterprise hybrid needs. API is a big deal to enterprises; it enables consistent cloud management experience and seamless hybrid cloud adoption. Latest AWS Price Cuts Target the Enterprise & the Competition. By: Jason Verge July 25th, 2013. Featured Cloud Articles.

article thumbnail

The Hacker Mind Podcast: Crimeware As A Service

ForAllSecure

That’s what a criminal malware enterprise looks like today. If I'm constantly if I'm being asked for a second factor of authentication, as long as that's secure, and I think hardware token is the way to go. And with any business, you have to learn how to diversify and grow your business. Definitely prevent that login.

Malware 40
article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

And then I've seen other ones that have been advertised that are, you know, that people tell me about that are available in other areas. I bet there are others who like commercial free narrative information security podcasts. They don't care what happens with it and so they turn around and sell it on eBay.