article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

Charlie Bell, a former Amazon Web Services executive, is now the leader of Microsoft’s newly formed, 10,000-person security engineering organization. He absorbed the 477-page technical tome in one weekend and returned to Redmond ready to change how Microsoft made software — prioritizing security and reliability over new features.

Microsoft 104
article thumbnail

3 certification tips for IT leaders looking to get ahead

CIO Business Intelligence

But certificates, even technical ones, can be an important part of any IT leader’s career journey, giving them hands-on experience, strategic insights into emerging technologies and methodologies, and the possibility to grow their peer network. However, most CIOs have failed to keep pace with fast-changing technology.

Insurance 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tech Moves: Madrona grows investment team; MicroVision, Axon add board members; and more

GeekWire

Prior to Amazon, Sharma co-founded LifeLemon, a consumer apparel e-commerce startup, led marketing at Flipkart, and was a developer at Oracle. She previously led product and digital strategy at security services provider WMC Global. • Jill Boon as vice president of people. Saykara Photo).

article thumbnail

Expat CIOs: IT leaders broaden horizons with global experiences

CIO Business Intelligence

As a foreigner, building trust with the IT team is extremely important, an aspect that proved to be “the most important and challenging issue” for David Berry, CIO of apparel and accessories manufacturer Boardriders, when he shifted from Häagen-Dazs in the US to become VP of IT at Grand Metropolitan Foods Europe in France.

Groups 98
article thumbnail

Dolphin hack: What can you do with a Flipper Zero

Dataconomy

Beginner hacking This Dolphin hack device is equipped to infiltrate an array of systems, from Wi-Fi networks and Bluetooth gadgets to NFC and RFID systems. However, a noteworthy mention is its limitation in decoding encrypted security codes on NFC cards, often termed as CSC, CVV, CVC, CAV, among other acronyms.

article thumbnail

Expanding the AWS Cloud: Introducing the AWS Canada (Central) Region

All Things Distributed

Given this, enterprises, public sector bodies, startups, and small businesses are looking to adopt agile, scalable, and secure public cloud solutions. Access to secure, scalable, low-cost AWS infrastructure in Canada allows customers to innovate and provide tools to meet privacy, sovereignty, and compliance requirements.

Cloud 60
article thumbnail

The Internet of First Responder Things (IoFRT)

Chief Seattle Greek Blog

A police officer’s badge or other apparel might have a small radio which broadcasts a signal unique to that officer, which allows many other communication devices (smart phone, radio, tablet computer) to automatically recognize the officer and therefore allow access to restricted databases such as criminal history.