Many security pros came up through the career ranks with a solid tech background. But security leadership demands more business acumen and expertise today. Lorna Koppel, Direction of Information Security for Tufts University, has been through this process in her career and shares her tips for making the transition smoothly and effectively. Watch Now ▶ |
|
| White Paper: Juniper Networks The security market will continue to evolve alongside new requirements arising from the Internet of Things, cloud computing and sophisticated targeted attacks. Read More ▶ | Annual IT Salary Survey shines a light on security hiring and compensation trends. Find out what your peers said about their career outlook and how your salary compares. Read More ▶ |
| Static and dynamic analysis can catch vulnerabilities in the development process -- before the bad guys can even access your code Read More ▶ |
| One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your identity online. Read More ▶ |
| | Software security for automobiles is improving but it will take another three or four years until car manufacturers can put overarching security architecture in place, says Stefan Savage, the winner of the 2015 ACM-Infosys Foundation Award in the Computing Sciences. Read More ▶ |
| White Paper: Juniper Networks Is your enterprise planning to leverage cloud computing and mobile computing in order to improve business agility, increase employee productivity, and lower capital expenses? Read More ▶ |
|
|
|