News

It’s easy to confuse information security and cybersecurity, as the two areas overlap in many ways. In fact, cybersecurity is a subset of information security. However, the fields are not quite the ...
When reviewing job growth and salary information, it’s important to remember that actual numbers can vary due to many different factors—like years of experience in the role, industry of employment, ...
To assist the Division of Information Technology in achieving its vision, Information Security MUST be considered by each and every member of the University community. So, what is Information Security ...
"Hey there! You found us," read the first five words of a hidden Apple job listing. The job listing was posted on one of the company's publicly accessible but hidden servers, hosting data on millions ...
What is a Chief Information Security Officer? A CISO is responsible for establishing security strategy and ensuring data assets are protected. CISOs traditionally work alongside the chief information ...
Hackers are becoming more sophisticated at the same time the cybersecurity talent pool is shrinking. That matters more than ever. Simply put, health data impacts people's lives. And even as hospitals ...
Hospital information security teams considering a bug bounty program should know a few things before entering the endeavor. The phrase bug bounty, for the uninitiated, refers to programs where hackers ...
What this place needs is a woman’s touch. No, I’m not referring to my office–although that statement might still hold true. I’m talking about the entire field of information security. Women make up a ...