Remove Applications Remove Enterprise Remove Information Security Remove Nonprofit
article thumbnail

Tech Moves: F5 adds CTO and HR chief; Adaptive names CFO; Techstars Seattle leaders depart

GeekWire

F5 Photos) — Seattle-based application security and delivery giant F5 announced two new executive appointments this week: Lyra Schramm , the company’s new chief people officer, and Kunal Anand , chief technology officer. F5 Chief People Officer Lyra Schramm (left) and Chief Technology Officer Kunal Anand. (F5

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Both nonprofits, their individual missions and goals are synergistic: CSA: To promote best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing. Vendors are also stepping up.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Both nonprofits, their individual missions and goals are synergistic: CSA: To promote best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing. Vendors are also stepping up.

article thumbnail

The ‘Great Retraining’: IT upskills for the future

CIO Business Intelligence

According to the 2023 State of the CIO , IT leaders are looking to shore up competencies in key areas such as cybersecurity (39%), application development (30%), data science/analytics (30%), and AI/machine learning (26%).

Training 129
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.

System 52
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

And so, myself and another individual named Rob Farrell, we were brought in to start a security team. And so we were basically you know, we started doing enterprise monitoring packet captures, you know, decryption, replaying all the events, incident response, all the assessment work, that it was a playground, you know, I got to do everything.