The size of the information security analyst workforce in the United States rose by nearly 20 percent in the past year, according to an Information Security Media Group analysis of U.S. Bureau of Labor Statistics data.
The information security field has done a poor job of attracting and retaining women, contends Jo Stewart-Rattray, international director of ISACA, who emphasizes the need for mentoring as well as salary equity.
An alert issued - and then yanked - by the FBI about fraud vulnerabilities linked to EMV chip cards is reigniting the debate between bankers and retailers over whether EMV in the U.S. should be chip-and-PIN or chip-and-signature.
Increasingly, as enterprise leaders plan security investments, they think not just about threats and technology, but also how to tie their decisions to business performance. Gartner's Sid Deshpande explains the shift.
The 6-year-old U.S. Cyber Challenge, designed to build interest in cybersecurity careers, is going strong, as participation in its online competition and cyber boot camps continues to grow, says Karen Evans, the organization's national director.
Cybersecurity adviser Patricia Titus, a former CISO, says too many women are leaving the information security field for jobs with less pressure and more work schedule flexibility. So she urges organizations to offer more incentives to attract and retain women in the field.
What does an organization do when it cannot afford to fund a full-time C-level security leader? Enter the virtual CISO, a growing service offering in India. Experts discuss the business value and benefits.
Although they apparently weren't caused by cyber-attacks, the impacts of computer failures at the New York Stock Exchange, United Airlines and the Wall Street Journal have much in common with the aftermath of breaches.
Luck, timing and execution. Those words have guided Malcolm Harkins' career, and they played a huge role in the longtime Intel security chief departing to be global CISO at Cylance. What are his new challenges?
Dick Williams, CEO of digital security firm Webroot, says the cybersecurity profession needs more than just technical experts. Learn why he says firms will seek out those who can understand the behaviors of cyber-attackers.
When security succeeds, it is often unnoticed. That success might also make security investments hard to sustain, given its low profile in organizations. Gartner's Tom Scholtz discusses articulating security's business value.
Patching is among the primary challenges facing enterprises in their adoption of IoT devices. Fortinet's Darren Turnbull shares insight on how to anticipate and respond to the top security obstacles.
The IT security industry must do a much better job of persuading young people with the requisite math and science skills to join the cybersecurity workforce rather than choose another profession, says David Shearer of (ISC)².
Do CISOs need mentoring? Daniel Lohrmann shares insights on the importance of mentoring CISOs to enable them to spot growth opportunities and also to build up their interpersonal skills.
In the wake of the breaches suffered by JPMorgan Chase, Sony and Anthem, attack attribution and information sharing are playing more prominent roles for banking leaders, and they will be key discussion points at the upcoming RSA Conference 2015 in San Francisco.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.