InformationWeek Security
Data Theft Risks Exposed; Quantum Security Conundrum; CISOs' C-Suite Connection Tested

View in Browser
InformationWeek Security
January 30, 2025

Hottest Places to Find a Tech Job
Tidal Wave of Trump Policy Changes Comes for the Tech Space
President Trump’s barrage of executive orders and suggested policy pivots on AI, cybersecurity, and more bring a potential sea change to the tech industry.

Continue Reading

 

TOP STORIES


Data Thefts: Indecent Exposure to Risk

Data thefts by ransomware gangs are causing devastating losses. What can you do when it happens to your company?
Read More

What's New (And Worrisome) in Quantum Security?

A new generation of quantum computers could render current cryptographic technology approaches useless. Is a solution even possible?
Read More

CISOs Are Gaining C-Suite Swagger, but Has It Come With a Cost?

The number of CISOs who report directly to the CEO is up sharply in recent years, but many still say it's not enough to secure adequate resources.
Read More

TECH RESOURCES


WHITE PAPERS


ONLINE EVENTS

Learn More
 
Hottest Places to Find a Tech Job
AI Integration Impacts Data, Cybersecurity Skillsets
Adoption and evolution of artificial intelligence and machine learning are transforming tech roles, prioritizing advanced skills and interdisciplinary expertise. Read More
Hottest Places to Find a Tech Job
China’s DeepSeek Suspects Cyberattack as Chatbot Prompts Security Concerns
The Chinese AI startup says it was hit with “large-scale malicious attacks” that disrupted its services after its successful launch catapulted the company’s chatbot to the No. 1 spot on Apple’s app store. Read More
Hottest Places to Find a Tech Job
9 Ways CISOs Can Stay Ahead of Bad Actors
Security leaders are expected to defend their organizations against existing and emerging threats. Here are some tactics they can use to crack down on the enemy. Read More
Hottest Places to Find a Tech Job
10 Ways Employees Are Sabotaging Your Cybersecurity Stance
Following are some ways, whether intentional or not, employees can undermine cybersecurity and some advice on how to handle each scenario. Read More
InformationWeek Security
facebook twitter rss linkedin
InformationWeek Operated by TechTarget, Inc.
and its subsidiaries, | 275 Grove Street, Newton,
Massachusetts, 02466 US

Contact Us | Privacy Policy | Unsubscribe
Copyright © 2025 TechTarget, Inc. or its subsidiaries.
All rights reserved.