Windows Server 2003

Career development News

View All News

Career development Get Started

Bring yourself up to speed with our introductory content

  • Guide: Important steps to improving your QA career

    If you're looking into a QA career or find yourself already there, this guide navigates the ever-changing software testing world with steps for moving forward as a QA pro. Continue Reading

  • Cybersecurity careers soar with security leadership skills

    Security leadership abilities are hard to quantify. Certifications and degrees may ease the way into a career in cybersecurity, but hard-won experience is usually the surer path into a role that can influence meaningful change in today's complex environments. Whether they report into the CIO or outside of the IT organization, CISOs handle growing levels of responsibilities as evolving threats and infrastructures mean higher risk and no room for staff shortages. In this Information Security issue on cybersecurity careers, we look at the path to CISO. What are the measures of success or failure in this positon? Is it worth it?

    As more Fortune 5000 companies seek CISOs to handle cybersecurity concerns, larger organizations in financial services and defense industries have piqued everyone's interest with their continued investment in the human factor -- the je ne sais quoi that results in successful threat hunting. While many definitions of hunting can be found, threat hunters essentially search for the traces attackers leave behind in an IT environment, usually before any alerts of their activities are generated by security devices.

    "I used to think that only the best security operations center people could be threat hunters, but that's not always true," said Anton Chuvakin, a Gartner research vice president. "The best SOC analyst may be good at responding to alerts, but they don't always have the creativity that's needed."

    As automation and machine learning gain hold, technology is still no substitute for security leadership abilities and cybersecurity talent. In this issue of Information Security magazine, we look at cybersecurity careers and the best ways to build top-notch security organizations.

     Continue Reading

  • Polycom CISO focused on ISO 27001 certification, data privacy

    Tasked with security and compliance, Lucia Milica Turpin watches over internal systems and remote communications customers entrust to the video conferencing company. Continue Reading

View All Get Started

Evaluate Career development Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Virtualization admin? Pivot -- pivot now -- to a cloud computing career

    Experienced virtualization admins should consider the facts: The cloud is running traditional virtualization off the road. Change lanes before yours disappears. Continue Reading

  • Talent management systems oversee entirety of employee lifecycle

    The 'war for talent' has started and talent management systems are here to help. See how they help businesses grow by recruiting, developing and retaining employees. Continue Reading

  • Cloud access security brokers: Hard to tell what's real

    Most cloud access security brokers offer CISOs a way to set policy and gain better understanding of multiple cloud services and data in use across the enterprise. As CASBs have gained momentum in recent years, use cases for them have expanded. Do these tools fill the gaps around visibility and control of software as a service and other cloud services?

    Although cloud service visibility and data leak protection continue to be the biggest drivers, cloud access security brokers can do more than just help with your shadow IT problem and unsanctioned application activity in the cloud.

    Organizations are increasingly looking to use cloud access security brokers to identify anomalies in data movement between on-premises and cloud apps as well as multiple cloud services. Malware identification and encryption of data have become important. More enterprises are also beginning to use CASBs or similar intermediary security technologies to provide some level of security policy management for custom identity-as-a-service platforms.

    In this issue of Information Security magazine, we look at cloud access security brokers and the best ways to evaluate new models, such as infrastructure as a service and platform security.

     Continue Reading

View All Evaluate

Manage Career development

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Career development Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve