LATEST FEATURES

Reboot 25: Honorable mention

Reboot 25: Honorable mention

Hang around IT security long enough and several of the same names keep popping up. With good reason. They have both vision and influence and they aren't afraid to use them.

Reboot 25: Threat seekers

Reboot 25: Threat seekers

These explorers' findings of critical vulnerabilities - from Heartbleed to Shellshock - have generated excitement, along with awareness, and made an indelible mark on security.

Reboot 25: The influencers

Reboot 25: The influencers

Blessed are the influencers for they will make a true difference - through policy, vision, drive, innovation and ideas - in the course of information security. What sets our selection apart is that they've held significant sway on the direction of IT security.

Reboot 25: Thought leaders

Reboot 25: Thought leaders

These professionals have done everything from cryptography to founding an influential security conference.

Reboot 25: Top management

Reboot 25: Top management

From childhood fascinations and unlikely epiphanies to unexpected opportunities and market surges, top security managers find inspiration in almost anything - and they're willing to seize opportunity and take responsibility to lead their teams.

Reboot 25: Industry pioneers

Reboot 25: Industry pioneers

The following hitched up their digital wagons to blaze new trails in cybersecurity.

A look ahead: Security experts share forecasts on 2015

A Q&A gathering experts' thoughts on the threats they considered important in 2014 and envision imperiling us in 2015.

And a little child shall secure them: The next generation of CISOs

And a little child shall secure them: The next generation of CISOs

You're never too young to learn about information security, Teri Robinson reports.

An epic ride: A look back at the ever-changing information security industry

An epic ride: A look back at the ever-changing information security industry

Over the past quarter century, corporate information security has come into its own, reports Karen Epper Hoffman.

Safe tether: Wearables

Safe tether: Wearables

Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.

Sign up to our newsletters

TOP COMMENTS