article thumbnail

15 ways to grow as an IT leader in 2024

CIO

As workers at all levels put together their development plans for 2024, IT leaders, recruiters, researchers, and advisors share here what actions CIOs can take to advance their careers if they want to embrace a growth mindset. It’s not just talk or a label. It really has to relate to what you do,” she adds.

article thumbnail

Women IT leaders take center stage

CIO

Early in her career as a program management specialist at AT&T, Balaban became an active member with the Project Management Institute’s New Jersey chapter, which put her front and center at plenty of events. That turn of events taught her the importance of visibility to professional success. It’s not fair, but it exists.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why generic marketing approaches don’t work on software developers

TechCrunch

“Most of the technical content published misses the mark with developers. The book title is a call to these marketers to treat their technical audience differently. I hope the book helps anyone who wants to reach developers directly in an authentic way. Why did you write a book titled “Developer Marketing Does Not Exist”?

article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

That’d be the consequences of suffering a cyber event, according to a report from insurer company Allianz Commercial. That’s the number one skill CISOs must acquire in 2024, according to Greg Touhill, Director of the CERT Division of Carnegie Mellon University’s Software Engineering Institute (SEI).

article thumbnail

Architect defense-in-depth security for generative AI applications using the OWASP Top 10 for LLMs

AWS Machine Learning - AI

What operational and technical best practices can I integrate into how my organization builds generative AI LLM applications to manage risk and increase confidence in generative AI applications using LLMs? What are some ways to implement security and privacy controls in the development lifecycle for generative AI LLM applications on AWS?

article thumbnail

Cyber Canon Book Review: Hacks that Shocked the World

Palo Alto Networks

Review: This book provides an easy-to-read, non-technical account of some of the biggest cyber attacks in recent years: Sony, HBGary, John Podesta, TJX, TalkTalk and Mirai. Author Charles Arthur uses storytelling to makes some of the biggest recent breaches understandable and relatable through this non-technical narrative.

article thumbnail

A Candid Conversation about a Career in Cybersecurity: Q&A with Daniel Spicer

Ivanti

As budget was limited, I flexed my technical skills to build the tools that we needed. At Ivanti, I enjoy advising how to make our technology better and protect our customers. One question I like to ask a potential hire is, “What fields would you want in a web request log in order to investigate a potential security event?”