There's never been a better time to become a cybersecurity professional. Whether you're working for a bank, startup, government organization, or running your own business, cybersecurity as a career means you'll always be in demand. But how do you get … Read more
The Security Manager is responsible for monitoring the security operations on digital platforms or infrastructures.
His role covers different aspects of a digital ecosystem, from the implementation of security policies to regulations, to the monitoring of different events, the standardization and verification of security protocols, knowing how to create the procedures for responding to security emergencies, verifying the assessments security, as well as overseeing specific aspects of the work of other figures, such as Developers and IT specialists in different areas.
Find job offers in Job Search for Security Manager.
Table Of ContentsWho is Peter ToddSingle-use-seals in the cryptocurrencies worldSlides When we asked Peter Todd to introduce himself at Blockchain and Crypto Values Conference in Milan, he replied: "I help people to apply cryptography to their … Read more
Not a day passes without news of cybersecurity - a ransomware attack, data theft, DDos attack, a research identified vulnerability, or serious hardware flaw. At this year's Codemotion Amsterdam, Eward Driehuis, (former research chief at … Read more
Giovanni Merlos Mellini is the Head of Information, Systems and Network Security at Enav S.p.A., the Italian Air Navigation Service Provider. He is also the founder of the not-for-profit association Cyber Saiyan and the organiser of RomHack, a free … Read more
The world of wireless terrestrial telecommunications is on his way to 5G, a new approach to use the radio spectrum that is incompatible with all previous efforts. The main improvements promised by 5G are higher speed, higher number of connected … Read more
What is the perception of security in the brave new 5G world? We asked this question to some CxOs in the cybertech arena. The overall picture is that a large part of the companies is making small investments in the specific area, while some of them … Read more
While 5G is only for the highly developed world, other solutions are really inclusive for everybody in the world. Will we still call "Internet" the final result? Over half of the world's population is unconnected. OneWeb are building the world's … Read more
In 2017 a US ally shot down a $200 drone with a $3 million Patriot missile. Clearly this is overkill, but it gives an idea about the challenges security is facing and how a drone you can find in a civilian market can pose a threat for military … Read more
Two of the biggest buzzwords of 2018 are Serverless and GDPR. So, when I saw a talk titled “How to go serverless and not violate the GDPR”, I was hooked! There are good reasons why everyone is talking about Serverless and GDPR. Serverless technology … Read more
Hi, I’m Anastasiia Voitova and I gave a talk about cryptography and risk management at Codemotion Milan 2018. I am product engineer in cryptographic software company Cossack Labs – we create developer-friendly software to protect data and to help … Read more
Web security is a topic that just won’t go away. Every day we hear the latest revelations – look at the latest scandal with Marriott admitting over 500 million customer records have been stolen using a breach that had been active since 2014! Dave … Read more
As an Advisory CISO - Global for Duo Security and founder of Liquidmatrix Security Digest, Dave Lewis understands only too well the risks posed by the web. In his talk at Codemotion Berlin, The Se7en Deadly Sins Of Web Security, Dave discussed how … Read more
Security is a serious concern for every web application developer, or at least this is what we like to think every time we use our credit card and give personal details on an online form. Still, security breaches occur frequently on a wide range of … Read more
Encryption algorithms are widely used in the IT industry to provide confidentiality, authentication, intellectual property protection and more. The attention on privacy and cybersecurity in general is rapidly increasing, forcing vendors and … Read more
The world is increasingly interconnected through the internet. More and more "smart" devices and appliances are now online 24 hours a day. But what are the real implications of the development of IoT and home automation? Are users really safe? What … Read more
Dinis Cruz is not only an outstanding drummer: he is also an active OWASP contributor. He is focused on creating Application Security teams and providing Application Security assurance across the SDL (from development, to operations, to business … Read more
The advent of any advance in technology raises doubts about its dark side. Every technology can be used both for the good and for the bad, and there is no way to plan how it will deploy. Privacy, whatever you call it, is the main concern of our time … Read more
Jaya Baloo is the CISO of KPN Telecom in the Netherlands, and since 2017 she is recognized as one of the 100 most influential people on security issues worldwide. She shared her expertise and her vision on quantum computers and their importance on … Read more