Taylor Armerding

How to write an IT security engineer job description

How to write an information security architect job description

How to write an information security architect job description

A good information security architect straddles the business and technical worlds. Writing a solid, clear job description ensures that both sides understand the role.

The best of Black Hat: The consequential, the controversial, the canceled

The best of Black Hat: The consequential, the controversial, the canceled

Over the past two decades, the annual Black Hat conference has had its share of controversy. CSO looks back at the most significant talks and demonstrations.

How to write an information security analyst job description

How to write an information security analyst job description

A thorough, clear job description will ensure that security analysts stay on the same page with management expectations.

What is CVE, its definition and purpose?

What is CVE, its definition and purpose?

CVE is a program launched in 1999 by MITRE, a nonprofit that operates research and development centers sponsored by the federal government. Its purpose is to identify and catalog vulnerabilities in software or firmware into a free...

Caught in the breach – what to do first

Caught in the breach – what to do first

Since there is no way to prevent every cyber attack, incident response is crucial. Experts at the MIT Sloan CIO Symposium talk about what to do immediately after the bad news hits.

AI: The promise and the peril

AI: The promise and the peril

Two panels at the MIT Sloan CIO Symposium this week focused on how to embrace the almost magical productivity benefits of artificial intelligence without leaving workers behind.

Cybersecurity ROI: Still a tough sell

Cybersecurity ROI: Still a tough sell

Cybersecurity is a wise investment. But as a panel of experts at the MIT Sloan CIO Symposium said, it is difficult to put an exact number on it.

Vocal theft on the horizon

Vocal theft on the horizon

Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized...

Mixed reviews for Trump’s Executive Order on cybersecurity

Mixed reviews for Trump’s Executive Order on cybersecurity

Experts generally agree that President Trump’s cybersecurity Executive Order is well intended and a good start. But several of them have specific suggestions on how it could be improved.

Boston Fed conference: Security still comes down to the basics

Boston Fed conference: Security still comes down to the basics

Not every bank has the money or the staff to do everything on the “best practices” lists of multiple regulatory agencies. But multiple speakers and panelists at the Boston Fed’s 2017 Cybersecurity Conference agreed that most financial...

Privacy for everybody means privacy for pedophiles

Privacy for everybody means privacy for pedophiles

The so-called Playpen cases – which arose from the FBI running a child porn website as a sting operation – has prompted an intense debate over the Fourth Amendment’s protections from “unreasonable” search and seizure.

Load More