TECHNOLOGY - Page 111

Spencer Parker, Senior Director of Product Management, CrowdStrike.

How forensics can help to identify your cyber adversary

Adversary attribution enables security professionals to understand the who, how and why behind the cyberattacks targeting potentially their business. Knowing about espionage-motivated adversary provides guidance on where to place defensive shields-up measures
2 years ago
Adrian Taylor, Regional VP of Sales, A10 Networks.

Why are CSOs and CISOs getting burnt out

CSOs, CIOs and CISOs have never had it so tough. Alongside their traditional responsibilities, they must now face a cybersecurity threat environment that is growing exponentially, and a growing cyberskills gap. As
2 years ago
Bill Holz, VP Analyst, Gartner.

How development teams can become agile

Core skills like Scrum, Kanban and test-first are essential for agile teams. Knowledge of collaborative development and agile architecture can serve as a value-add. Scaling agile across the enterprise represents the next
2 years ago

Welcome to

By signing or creating an account you agree with our Code of conduct & Privacy policy