Unseen Threats: Local Vulnerabilities and the Strategic Threats Lurking in National Critical Functions
By Charles Harry, PhD, Director, Center for the Governance of Technology and Systems (GoTech), University of Maryland In March of
Read MoreBy Charles Harry, PhD, Director, Center for the Governance of Technology and Systems (GoTech), University of Maryland In March of
Read MoreBy Tim Winders, Ph.D., Deputy CIO and Assistant Vice President for Information Technology, Purdue University The days of employees working
Read MoreBy Jen Dalton, Chief Information Security Officer at Brush Claims In today’s technological landscape, it is crucial for all insurance
Read MoreBy Brennan Lodge, Adjunct Professor, Information Technology & Data Analytics, New York University Cybersecurity professionals have long been embroiled in
Read MoreBy Jennifer Koester, Director of Enterprise Data, State of Delaware Data teams across the globe are investing in new technology
Read MoreBy Steven Blumer, Associate Medical Director of Radiology Informatics, UPMC There has been much hype surrounding the potential of AI
Read MoreBy Jonathan Richardson, Network Imaging Director, Atrium Health Wake Forest Baptist Spect-CT has been in the nuclear medicine world for
Read MoreBy Eddie Myers, Crothall Healthcare Director of Cybersecurity (Healthcare Technology Solutions Division) The rapid digitization of the healthcare industry has
Read MoreBy Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce Introduction In today’s interconnected world, where digital
Read More