How one CISO solved his talent problem

How one CISO solved his talent problem

0
It's hard getting hold of talented individuals in cyber security unless you have limitless funds. Even then, you don't always get what you pay...
How are you meeting the challenges of diversity, equity and inclusion? (Image Credit: Sharon McCutcheon on Unsplash)

How are you meeting the challenges of diversity, equity and inclusion?

0
Diversity has been at the top of the HR agenda in recent years. It is not the only challenge. Equity and Inclusion also need...
What do APIs, DR, Qinch and Mina Murray have in common? (Image Credit: Christopher Gower on Unsplash)

What do APIs, DR, Qinch and Mina Murray have in common?

0
Eric Newcomer is the new CTO of software vendor WSO2. He's also a lifelong fan of British comic artist Alan Moore. Enterprise Times caught...
How do you manage, train and retain a cadre of CISOs? (Image Credit: getty-images-SGdfQUjcYDI-unsplash)

How do you manage, train and retain a cadre of CISOs?

0
Most organisations struggle with a single CISO overseeing all their security requirements. But what if you are a global conglomerate with over 100 business...
Liz Rice and Sugu Sougoumarane talk security and databases

Liz Rice and Sugu Sougoumarane talk security and databases

0
Enterprise Times caught up with Liz Rice, Technology Evangelist, Aqua Security and Sugu Sougoumarane, CTO, PlanetScale Data at the Cloud Native Computing Conference and...
A low-code platform can improve your cyber security (Image Credit: Arian Darvishi on Unsplash

A low-code platform can improve your cybersecurity

0
In our second of three podcasts recorded after Appian World was cancelled, Enterprise Times talked to Michael Beckley, Chief Technology Officer and co-founder, Appian....
Cybersecurity for military veterans

Julian Meyrick, IBM, on cyber training for veterans

2
Julian Meyrick is Vice President for Security, IBM Europe. IBM has been sponsoring cybersecurity training courses for military veterans. It is part of their...
Security has to build its own pipelines for DevSecOps (Image Credit: Johnson Martin from Pixabay )

Security has to build its own pipelines for DevSecOps

0
Every DevOps conference likes to talk about the benefits from DevSecOps, shifting security left. The challenge for most organisations is how to do it....
Is your cyber hygiene good enough? (Image Credit: Gerd Altmann from Pixabay)

Cyber hygiene is the foundation of good security

0
Is your cyber hygiene good enough? Do you know what devices are on your network? Can you determine between IT, IoT and OT devices?...
Is your data compliance ready? (Image Credit: Federico Orlandi from Pexels)

Is your data compliance ready?

0
Compliance requirements regularly change. For data teams, that creates significant challenges in making sure data is compliance-ready. It's a non-trivial task. To understand more...

LATEST NEWS