What are the nuclear security considerations that the extensive use of advanced digital systems and information-technology features bring with them? How do nuclear security regulations address risks ...
If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and outlines ...
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief ...
If you would like to learn more about the IAEA’s work, sign up for our weekly updates containing our most important news, multimedia and more. Vasiliki Tafili, IAEA Department of Nuclear Safety and ...
The title of Chief Information Security Officer, or CISO, emerged during the 1990s as the first large-scale cyber attacks started to occur. Since then, it's become a near-ubiquitous role in any large ...
A view of the IRS building in Washington, D.C. (Chip Somodevilla / Getty Images) The IRS Office of Safeguards seeks a contractor to support computer security reviews ensuring outside agencies are ...
Hackers used stolen login details from an employee's computer to access the Japanese media giant’s Slack messaging platform, ...
Computer information systems (CIS) managers organize and supervise computer-related activities. Industry experts evaluate the company's needs, suggest computer system upgrades, and oversee network ...
The President of the Federal Office for Information Security has called for changes to the hacker paragraph. Support comes ...
“In the intricately complex world of information technology and security assistance, there are a few unsung heroes who operate behind the scenes,” Caine Mathis, chief of IT operations at the Security ...
Portable genetic sequencers used around the world to sequence DNA have critical, previously unreported security ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果