article thumbnail

Microsoft will base part of senior exec comp on security, add deputy CISOs to product groups

GeekWire

Charlie Bell, executive vice president of Microsoft security, speaks at the GeekWire Summit in 2022. Bell said the changes build on the Secure Future Initiative (SFI), introduced last fall. The company did not say how much of their compensation will be based on security.

article thumbnail

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Cyber Security and the Data Protection Act (acunetix.com). Registration is required but ORNL employees attend at no cost.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Security Innovation Network Showcase: 3-4 Dec in DC

CTOvision

We have been long-term supporters of the Security Innovation Network (SINET) and believe this group plays an important role in being a catalyst for innovation around enterprise cyber security. Of the many virtuous activities of this group, my favorite event is the yearly Showcase held in DC. Congressman C.

Network 276
article thumbnail

D.C. Think Tank Launches Cybersecurity Working Group

SecureWorld News

think tank focused on bipartisan solutions promoting health, security, and opportunity for all Americans has launched a working group with the aim of identifying the most pressing risks in cybersecurity. This group understands what it takes in order to drive action in the boardroom, the halls of Congress, state capitals, and beyond.".

Groups 62
article thumbnail

Ransomware: It’s coming for your backup servers

Network World

This makes backup systems themselves the primary target of some ransomware groups, and warrants special attention. Hackers understand that backup servers are often under-protected and administered by junior personnel that are less well versed in information security.

Backup 210
article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

A User Activity Monitoring (UAM) tool is a software solution designed to track and record the activities and interactions of users on computers or networks for security, compliance, or management purposes. UAM tools also greatly help ensure data security. UAM systems operate by installing a software agent on each employee's computer.

Tools 97
article thumbnail

Aligning security and business strategies

CIO Business Intelligence

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. This can be a challenge to cyber budgets in organizations where security is viewed primarily as a cost center.