article thumbnail

Tech Moves: Nordstrom names chief information security officer; Meta research scientist joins AI2

GeekWire

Nordstrom Photo) — Nicole Ford joined Nordstrom as chief information security officer. Ford previously served as vice president and CISO at Rockwell Automation, with past experience leading security transformation initiatives and developing cybersecurity programs. Nicole Ford. Founded in 2015, Kirkland, Wash.-based It raised $1.9

article thumbnail

Sources of cyber intelligence from governments and academia

CTOvision

Cyber intelligence is a growing discipline in the cybersecurity community, providing important information for cyber defenders in enterprises large and small. This post reviews key sources of cyber intelligence provided free from governments and academia. There are many many other sources provided by governments and academia.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IDG Contributor Network: 3 new information security jobs for the digital enterprise

Network World

The responsibilities of information security are rapidly changing as enterprises digitize. Digitization has spurred three company-wide shifts, creating the need for three associated new information security roles. Shift 1: Strategy over governance.

article thumbnail

The Security Innovation Network Showcase: 3-4 Dec in DC

CTOvision

We have been long-term supporters of the Security Innovation Network (SINET) and believe this group plays an important role in being a catalyst for innovation around enterprise cyber security. If you work in enterprise governance, cybersecurity or enterprise IT please check out the agenda below and register and attend.

Network 276
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

article thumbnail

E-Government: A Graduate Class

CIO Musings

One thing I am working on for this fall that I am very excited about is a class at VCU that is near and dear to me: E-Government. The class title is INFO 691 Topics in Information Systems – Digital Government This class is about using information and communication technologies to provide government services.

article thumbnail

Security, Politics & Tech: How Firms Are Working with the Government, Not Against It

CIO Business Intelligence

Due to the rise of “big tech”, the federal government has gotten more involved in the tech sector in recent years. Due to this shift, top tech companies are increasingly partnering with the government to not only further their own success but also the success of the United States. Improving Government Technologies. As the U.S.