In the wake of the Hillary Clinton email controversy, organizations need to be more aware of the risks of unsanctioned "shadow IT" and take appropriate mitigation steps, says security expert Mac McMillan.
Unstructured data may be the world's best-kept secret. Companies have been slow
to recognize that valuable information lies within the documents, emails, and social streams
that are being constantly created. The value of structured data continues to grow, of course -
but the new battleground for competitive...
Whatever your favorite metaphor may be - mountain, tsunami, landslide, or avalanche - it's an inarguable fact that we live in a world that is creating and storing more data than most of us can imagine. From presentations and emails, to videos and photos, to documents of every type, we create 2.5 exabytes of data every...
It's a challenging time to be an IT professional these days. While data has become more valuable as companies are looking for ways to harness the intelligence within, the explosive growth in the amount of data stored has a downside. Many organizations are experiencing a seemingly endless- and escalating- threat to the...
FS-ISAC has issued a white paper with tips on streamlining third-party software risk assessments. One member of a new working group explains why the adoption of standard security controls is so critical.
Are you considering a secure, managed file transfer solution to address the security of information and data transferred to, from and inside your organization?
This in-depth white paper shares best practices, checklists and worksheets in evaluating solutions such as:
Conducting an Evaluation;
Strategic...
The guidance discusses methods, techniques and best practices for the sanitization of target data on different media types and risk-based approaches organizations can apply to establish and maintain a media sanitization program.
The massive growth of data within today's enterprise overwhelms traditional security controls. How can organizations inventory, manage and secure Big Data at every stage of its lifecycle? How can they turn the security challenge into a security advantage? Join this panel of experts for a discussion of Big Data and...
Big data, as Bernt Ostergaard notes, is hot, and using tools to analyze massive amounts of data in a variety of forms is being employed to identify trends that can help leaders accomplish their goals.
Discussing Verizon's new report on the state of PCI compliance, PCI expert Jen Mack says payment card security today is "disappointing," and global merchants are at serious risk of new data breaches.
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Jobs in information security -- including architects, analysts and administrators with hot skills and competencies -- are among the IT opportunities offering the most employment security in the current economy.
This is the news from Foote Partners, LLC, a Florida-based research consultancy that focuses on IT...
Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives
The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all.
So, the Information...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.