article thumbnail

Tech Moves: Nordstrom names chief information security officer; Meta research scientist joins AI2

GeekWire

Nordstrom Photo) — Nicole Ford joined Nordstrom as chief information security officer. Ford previously served as vice president and CISO at Rockwell Automation, with past experience leading security transformation initiatives and developing cybersecurity programs. Nicole Ford. Founded in 2015, Kirkland, Wash.-based

article thumbnail

DoD Announces Third 'Hack the Pentagon' Bug Bounty Program

SecureWorld News

Department of Defense (DoD) is turning to the private sector to bolster its cyber defenses with the launch of the third iteration of its "Hack the Pentagon" bug bounty program. The program is being managed by Defense Digital Services (DDS), which is responsible for managing technical risks and vulnerabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Our Top Recommendations For Your Security Program: CISOs Get An Offer They Can’t Refuse

Forrester IT

The Scorsese classic has a few surprising parallels with today's chief information security officer.

Security 195
article thumbnail

The Security Innovation Network Showcase: 3-4 Dec in DC

CTOvision

We have been long-term supporters of the Security Innovation Network (SINET) and believe this group plays an important role in being a catalyst for innovation around enterprise cyber security. Networking Lunch – Information Sharing Hour. 7 hours Networking and Networking Reception. and abroad.

Network 276
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

article thumbnail

Is your security program based on hard evidence or compliance voodoo?

IT Toolbox

What do you think of when you hear information security ? If you’ve been working in and around IT for a while, I’m guessing that things like documented security policies, network and endpoint controls, user training, disaster recovery plans and the like come to mind. But that’s

article thumbnail

Sources of cyber intelligence from governments and academia

CTOvision

Most every enterprise with a mature understanding of the importance of protecting their digital assets has a cyber intelligence program underway. Shares information on vulnerabilities via alerts and announcements. Large body of tips and awareness items useful to your cyber threat intelligence program.