Cybersecurity ROI: Still a tough sell
Cybersecurity is a wise investment. But as a panel of experts at the MIT Sloan CIO Symposium said, it is difficult to put an exact number on it.
View ArticleAI: The promise and the peril
Two panels at the MIT Sloan CIO Symposium this week focused on how to embrace the almost magical productivity benefits of artificial intelligence without leaving workers behind.
View ArticleCaught in the breach – what to do first
Since there is no way to prevent every cyber attack, incident response is crucial. Experts at the MIT Sloan CIO Symposium talk about what to do immediately after the bad news hits.
View ArticleThe 15 worst data security breaches of the 21st Century
Security practitioners weigh in on the 15 worst data security breaches in recent memory.
View ArticleMedical devices at risk: 5 capabilities that invite danger
It isn't just certain connected medical devices that put patient data and physical safety at risk, it's specific capabilities and systems within which they operate that make them a broad, and...
View ArticleWhat is the CVE and how does it work?
The Common Vulnerabilities and Exposures (CVE) Program has been cataloging software and firmware vulnerabilities for 18 years. Here’s how it can help you secure your company’s network.
View ArticleClosing the CVE gap: Is MITRE up to it?
Critics say the The Common Vulnerabilities and Exposures (CVE) program, managed by MITRE, is falling far behind in its mission to catalog and identify all known vulnerabilities. Its defenders say a new...
View ArticleWhat is the CVE and how does it work?
The Common Vulnerabilities and Exposures (CVE) Program has been cataloging software and firmware vulnerabilities for 18 years. Here’s how it can help you secure your company’s network.
View ArticleClosing the CVE gap: Is MITRE up to it?
Critics say the The Common Vulnerabilities and Exposures (CVE) program, managed by MITRE, is falling far behind in its mission to catalog and identify all known vulnerabilities. Its defenders say a new...
View ArticleHow to write an information security analyst job description
A thorough, clear job description will ensure that security analysts stay on the same page with management expectations.
View ArticleThe 5 worst Big Data privacy risks (and how to guard against them)
There are enormous benefits from Big Data analytics, but also massive potential for exposure that could result in anything from embarrassment to outright discrimination. Here's what to look out for -...
View ArticleThe best of Black Hat: The consequential, the controversial, the canceled
Over the past two decades, the annual Black Hat conference has had its share of controversy. CSO looks back at the most significant talks and demonstrations.
View ArticleHow to write an information security architect job description
A good information security architect straddles the business and technical worlds. Writing a solid, clear job description ensures that both sides understand the role.
View ArticleHow to write a CISO job description
The chief information security officer has a big, mission critical job. Make sure you spell out the CISO's duties and expectations for the role.
View ArticleHow to write an IT security engineer job description
The IT security engineer is on the front line of protecting a company's assets from threats. The job description should reflect the strong technical, organizational and communication skills required.
View Article
More Pages to Explore .....