5 ways the world of IT operations will shift in 2022 (and beyond)

Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at…

Second ransomware family exploiting Log4j spotted in U.S., Europe

Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at…

Log4j vulnerabilities, malware strains multiply; major attack disclosed

Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at…

How AI regulation is developing in the insurance industry

Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at…

Raj Tahil ’81 and Mary Jo Wrenn

Raj Tahil credits MIT with sparking his entrepreneurial instincts. “I learned to see problems as interesting…

Log4j vulnerability opened the door to the ransomware operators

Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at…

A campus exhibition

A campus exhibition | MIT Technology Review You need to enable JavaScript to view this site.…

Microsoft confirms new ransomware family deployed via Log4j vulnerability

Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at…

Microsoft: Log4j exploits extend past crypto mining to outright theft

Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at…

‘Vaccine’ against Log4Shell vulnerability has potential—and limitations

Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at…