The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...
Legacy IT is too brittle for the speed and complexity of today's organizational changes. CIOs at enterprises like Allergan, NewsCorp, Broadcom and Engie are transforming their businesses and simplifying the process of integration in
It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany.
Web app firewalls have the right idea - protect apps in production from attacks, but the execution is all wrong. It bogs down Security Teams with false alarms. We need to rethink how we approach application security. It's more than
As the remediation costs, customer impacts, and reputational damage of a data breach continue to skyrocket, the security industry must find new ways to prevent the exfiltration of proprietary data by cybercriminals and other malicious
DevOps is more a philosophy than a process. At its core, it's simply about better collaboration between development and operations teams. But where do you start with DevOps in the Enterprise? Despite the rumors, DevOps doesn't mean an
This morning, Trend Micro released a report about the exposed cyberassets in the top U.S. cities and most critical industry segments -- and in many cases, it was the smaller municipalities that had the largest number of problems.