Information Security
A chief privacy officer is a senior role that requires both cyber security and legal knowledge. We cover all the key aspects of the position, including job responsibilities, how to get hired, salary expectations, and the top companies hiring.
By Sam Woolfe in Information Security on March 22, 2021
Ransomware's hefty price: US government entities face over $860m in losses, spotlighting the critica
By Paul Bischoff in Information Security on January 15, 2024
A coronavirus testing company in Utah exposed more than 50,000 patients' scanned IDs and thousands of COVID-19 test results.
By Paul Bischoff in Information Security on March 16, 2022
Malware disguised as common help documentation can infect Windows PCs, including Windows 10.
By Paul Bischoff in Information Security on March 15, 2022
TLS (SSL) handshakes are a crucial part of your online security. Find out how they work and protect your information in our detailed guide.
By Josh Lake in Information Security on December 14, 2023
Have you heard about the cryptanalyst role and want to learn more about it? We reveal everything you need to know about this position, including salary expectations, and the best companies that are hiring.
By Sam Woolfe in Information Security on January 22, 2024
As a security specialist, you will play a crucial role in protecting the overall IT security of an organization. This post reveals all aspects of this role: what security specialists do, how to get hired and salary expectations.
By Sam Woolfe in Information Security on April 8, 2022
An MBA in cyber security can be a great option if you want to pursue a more senior, managerial, or business-oriented career in IT. Our guide on cyber security MBAs provides all the information you need to know about this qualification.
By Sam Woolfe in Information Security on April 14, 2022
If you would like to adopt a broad and highly responsible role in cyber security, then becoming a security consultant could be the right career choice for you. This guide reveals all aspects of this position including how to get hired and salary expectations.
By Sam Woolfe in Information Security on February 23, 2021
Page 18 of 46