IBM XIV Storage System

Career development News

  • May 22, 2017 22 May'17

    Sanderson and Code First: Girls - facing my coding fears

    When Sanderson Hotel London invited me to a Code First: Girls introduction to coding event (including free cocktails) I decided to see if code still gave me the cold sweats it did at university ...

  • May 04, 2017 04 May'17

    Three-quarters of non-tech workers want a job in IT - what's stopping them?

    For a long time, people working in IT laboured under the knowledge that nobody from outside IT was interested in what they do because it’s all too technical  - a bit boring and geeky. It’s been ...

  • April 24, 2017 24 Apr'17

    GUEST BLOG: Raising girls as people

    In this guest post Frances Burton, security services group manager at education technology solutions charity, Jisc, explains what it's like to be a "woman in technology" and why we should be ...

  • April 10, 2017 10 Apr'17

    Software salaries -- it's still very good news

    Job site just posted its top 25 highest paying jobs in America and 11 of those jobs were in high tech. And more than half of those, 7 actually, were software related. It's a really ...

View All News

Career development Get Started

Bring yourself up to speed with our introductory content

  • Cybersecurity careers soar with security leadership skills

    Security leadership abilities are hard to quantify. Certifications and degrees may ease the way into a career in cybersecurity, but hard-won experience is usually the surer path into a role that can influence meaningful change in today's complex environments. Whether they report into the CIO or outside of the IT organization, CISOs handle growing levels of responsibilities as evolving threats and infrastructures mean higher risk and no room for staff shortages. In this Information Security issue on cybersecurity careers, we look at the path to CISO. What are the measures of success or failure in this positon? Is it worth it?

    As more Fortune 5000 companies seek CISOs to handle cybersecurity concerns, larger organizations in financial services and defense industries have piqued everyone's interest with their continued investment in the human factor -- the je ne sais quoi that results in successful threat hunting. While many definitions of hunting can be found, threat hunters essentially search for the traces attackers leave behind in an IT environment, usually before any alerts of their activities are generated by security devices.

    "I used to think that only the best security operations center people could be threat hunters, but that's not always true," said Anton Chuvakin, a Gartner research vice president. "The best SOC analyst may be good at responding to alerts, but they don't always have the creativity that's needed."

    As automation and machine learning gain hold, technology is still no substitute for security leadership abilities and cybersecurity talent. In this issue of Information Security magazine, we look at cybersecurity careers and the best ways to build top-notch security organizations.

     Continue Reading

  • Polycom CISO focused on ISO 27001 certification, data privacy

    Tasked with security and compliance, Lucia Milica Turpin watches over internal systems and remote communications customers entrust to the video conferencing company. Continue Reading

  • Chenxi Wang discusses DEF CON hacking conference, 'Equal Respect'

    Grassroots efforts to shift cultural thinking in information security have had a positive effect, the former professor of computer engineering says. Continue Reading

View All Get Started

Evaluate Career development Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Career development

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Career development Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve