• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Codemotion Magazine

Codemotion Magazine

We code the future. Together

  • Discover
    • Live
    • Tech Communities
    • Hackathons
    • Coding Challenges
    • For Kids
  • Watch
    • Talks
    • Playlists
    • Edu Paths
  • Magazine
    • AI/ML
    • Backend
    • Frontend
    • Dev Life
    • DevOps
    • Soft Skills
  • Talent
  • Partners
  • For Companies
Home » Security Manager

Security Manager

The Security Manager is responsible for monitoring the security operations on digital platforms or infrastructures.
His/her role covers different aspects of a digital ecosystem, from the implementation of security policies to regulations, to the monitoring of different events, the standardization and verification of security protocols, knowing how to create the procedures for responding to security emergencies, verifying the assessments security, as well as overseeing specific aspects of the work of other figures, such as Developers and IT specialists in different areas.

Find job offers in Job Search for Security Manager.

automation, security, cybersecurity

Last update May 16, 2022 by Jenna Bunnell

How to Implement a Security Testing Program For Web Applications

As a web app developer, you have enough on your plate already. But with cybercrime on the rise – with 86% of companies experiencing at least one successful cyberattack in 2021 – it’s become more important than ever to test your own security … Read more

security testing 101

Last update May 2, 2022 by Emily Rollwitz

Security Testing 101: 9 Tried And Tested Ways to Find Security Flaws in Your Software

Software vulnerabilities can be devastating to your business. All it takes is one cyber attack or phishing scam to tarnish your reputation, bring your organization to a standstill, and prompt your customers to leave en-masse. After all, consumers … Read more

threat modeling, cybersecurity, PASTA, DREAD, STRIDE

Last update April 27, 2022 by Norman Di Palo

Threat Modeling for Digital Applications: A Quick Guide

Threat Modeling is a security design process to identify potential threats that may impact web and mobile digital applications and determine the correct controls to produce effective countermeasures. Discover essential steps, concepts, and best … Read more

Last update December 13, 2021 by David Maina

Automating Cybersecurity With Machine Learning

Artificial intelligence and its subfield machine learning play vital roles in cybersecurity today. It is not easy for a business to build robust cybersecurity systems without including these pieces of technology in its plans. Machine learning offers … Read more

What It Takes to Be a System Administrator in 2021

Last update September 24, 2021 by Lorenzo Ermigiotti

What It Takes to Be a SysAdmin in 2021

Technology is evolving at a rapid pace, bringing the need for organisations to hire SysAdmins who are up to managing and maintaining computer systems. Nowadays, with the growth of cloud computing and the emergence of new technology trends that are … Read more

7 Ways to Optimize SCADA Cybersecurity

Last update September 17, 2021 by Emily Newton

7 Ways to Optimize SCADA Cybersecurity

As the name implies, Supervisory Control and Data Acquisition (SCADA) networks house critical systems — including computers and applications — that control, facilitate, or handle essential services. They’re used to manage many critical infrastructure … Read more

Why Has Web App Security Become a Major Concern in Recent Times

Last update August 25, 2021 by Rushit Shah

Why Has Web App Security Become a Major Concern in Recent Times?

Web Application Security: Importance and Tools to Secure your Product  Web applications are being attacked and the number has just increased in recent times. There is an increase of more than 800% on web applications … Read more

Internet of things

Last update March 12, 2021 by John Allen

7 Mitigation Strategies to Address IoT Security Risk

The invention of the internet and its subsequent applications for online-based technology have drastically changed our understanding of digital tech. The implementation of Wi-Fi connected devices has led to the birth of concepts like ‘IoT’. IoT, … Read more

Last update September 16, 2020 by Cate Lawrence

The Lifecycle of a Remote Code Execution Security Incident

It's not always easy to understand the trust value of a penetration testing until a critical security incident happens to you. Last year at Codemotion Rome,  Giovanni Mellini is Head of Information, systems, and network security at ENAV S.pA., … Read more

Last update August 26, 2020 by Cate Lawrence

Does open source software have a security problem?

You'd be hard-pressed to find a day where a cybersecurity incident doesn't hit the news, whether it's hackers accessing personal data, undertaking a DDoS attack or deploying ransomware. Over the years, security breaches have crippled industries, … Read more

coworking

Last update August 6, 2020 by Lorenzo Ermigiotti

How to Prepare IT Infrastructure For Coworking Spaces

As the world moves away from the model of a traditional workforce, coworking spaces are on the rise. These offices are designed to suit small businesses, freelancers, or even larger companies that work remotely but need to take advantage of physical … Read more

Last update February 13, 2020 by Cate Lawrence

So you want to work in cybersecurity?

There's never been a better time to become a cybersecurity professional. Whether you're working for a bank, startup, government organization, or running your own business, cybersecurity as a career means you'll always be in demand. But how do you get … Read more

Last update February 7, 2020 by Luca Ferretti

Peter Todd: Helping people to solve their problem with Cryptography

When we asked Peter Todd to introduce himself at Blockchain and Crypto Values Conference in Milan, he replied: "I help people to apply cryptography to their problems". Who is Peter Todd Peter Todd is a well known and trusted Bitcoin Core … Read more

Cybersecurity is as much about social engineering as bugs

Last update December 12, 2019 by Cate Lawrence

Cybersecurity is as much about social engineering as bugs

Not a day passes without news of cybersecurity - a ransomware attack, data theft, DDos attack, a research identified vulnerability,  or serious hardware flaw. At this year's Codemotion Amsterdam, Eward Driehuis, (former research chief at … Read more

Life-cycle of a security incident: from detection to response

Last update December 4, 2019 by Leo Sorge

Life-cycle of a security incident: from detection to response

Giovanni Merlos Mellini is the Head of Information, Systems and Network Security at Enav S.p.A., the Italian Air Navigation Service Provider. He is also the founder of the not-for-profit association Cyber Saiyan and the organiser of RomHack, a free … Read more

Last update December 4, 2019 by Leo Sorge

5G: what’s in it for developers?

The world of wireless terrestrial telecommunications is on his way to 5G, a new approach to use the radio spectrum that is incompatible with all previous efforts. The main improvements promised by 5G are higher speed, higher number of connected … Read more

Last update November 27, 2019 by Leo Sorge

5G: what’s in it for security?

What is the perception of security in the brave new 5G world? We asked this question to some CxOs in the cybertech arena. The overall picture is that a large part of the companies is making small investments in the specific area, while some of them … Read more

Last update October 10, 2019 by Leo Sorge

5G: new satellites could narrow the digital divide – and hide the stars forever

While 5G is only for the highly developed world, other solutions are really inclusive for everybody in the world. Will we still call "Internet" the final result? Over half of the world's population is unconnected. OneWeb are building the world's … Read more

Last update October 7, 2019 by Domenico Pontari

Project Interceptor: avoiding counter-drone systems with nanodrones

In 2017 a US ally shot down a $200 drone with a $3 million Patriot missile. Clearly this is overkill, but it gives an idea about the challenges security is facing and how a drone you can find in a civilian market can pose a threat for military … Read more

Last update May 29, 2019 by Toby Moncaster

How to comply with GDPR in a serverless world

Two of the biggest buzzwords of 2018 are Serverless and GDPR. So, when I saw a talk titled “How to go serverless and not violate the GDPR”, I was hooked! There are good reasons why everyone is talking about Serverless and GDPR. Serverless technology … Read more

  • Go to page 1
  • Go to page 2
  • Go to Next Page »

Primary Sidebar

The IT Industry in Italy: Trending Positions, Salaries, and Main Skills for 2022

Codemotion and Adecco’s guide to understanding the IT working environment in Italy. Download here:

Adecco Whitepaper IT Report

Latest

Do You Love Open Source Too? Then Don’t Miss This Survey by Linux Foundation

Dev Life

grpc, http, rest

GRPC Approach for Improved Software Development

Web Developer

Using the Twelve-Factor Methodology in Cloud-Native Microservices

Microservices

svelte, javascript frameworks, vue.js, angular

Svelte: Why Is It an Innovation to Javascript Frameworks?

JavaScript

blockchain, avascan, avalanche, defikingdom, subnet

How to Deploy a Subnet on Avalanche Blockchain: The Case of DeFi Kingdom

Blockchain

Footer

  • Magazine
  • Events
  • Community
  • Learning
  • Kids
  • How to use our platform
  • Contact us
  • Become a contributor
  • About Codemotion Magazine
  • How to run a meetup
  • Tools for virtual conferences

Follow us

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube
  • RSS

DOWNLOAD APP

© Copyright Codemotion srl Via Marsala, 29/H, 00185 Roma P.IVA 12392791005 | Privacy policy | Terms and conditions

  • Magazine
  • Events
  • Community
  • Learning
  • Kids
  • How to use our platform
  • Contact us
  • Become a contributor
  • About Codemotion Magazine
  • How to run a meetup
  • Tools for virtual conferences

Follow us

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube
  • RSS

DOWNLOAD APP

CONFERENCE CHECK-IN