The IT security engineer is on the front line of protecting a company's assets from threats. The job requires strong technical, organizational and communication skills.
There are enormous benefits from Big Data analytics, but also massive potential for exposure that could result in anything from embarrassment to outright discrimination. Here's what to look out for — and how to protect yourself and your em
A thorough, clear job description will ensure that security analysts stay on the same page with management expectations.
Critics say the The Common Vulnerabilities and Exposures (CVE) program, managed by MITRE, is falling far behind in its mission to catalog and identify all known vulnerabilities. Its defenders say a new model is closing that gap.
The common vulnerabilities and exposures (CVE) program has been cataloging software and firmware vulnerabilities for 18 years. Here’s how it can help you secure your company’s network.
It isn't just certain connected medical devices that put patient data and physical safety at risk, it's specific capabilities and systems within which they operate that make them a broad, and vulnerable, attack surface.
Breaches are a fact of life in a connected world. Experts at the MIT Sloan CIO Symposium talk about how to minimize the damage
Artificial intelligence is here and its presence and associated disruption will increase in the future. Panelists at the MIT Sloan CIO Symposium discussed ways to ease that disruption.
Sponsored Links