Although insider-threat incidents within organizations tend to be different case-by-case, says Carnegie Mellon University's Dawn Cappelli, there are similarities and patterns that organizations can look for when mitigating their risks. What are some of the common characteristics among insiders, and how can...
People, as much as anything else, are a critical aspect of information risk management, and businesses and government agencies must monitor employees - and educate them, as well - to thwart a potential threat from within.
Bringing Your Own Device raises jitters among employers, who worry about exposing or losing sensitive data, and employees, who fret about their bosses spying on them. Despite these anxieties, the trend will continue because that's what people want.
One of the most respected CISOs in the federal government, the State Department's John Streufert, is taking his vast knowledge of IT security and continuous monitoring to Homeland Security, as director of the National Cybersecurity Division.
When it's time to stand up in court and discuss forensic evidence in a legal matter, you need someone who knows your business best, says Greg Thompson, VP enterprise security services at Scotiabank Group.
Employment among IT security professionals in the U.S. rose significantly throughout 2011, as unemployment virtually was nonexistent among those with cybersecurity skills, according to our analysis of government data.
Security leaders will need to tackle the top technology trends of big data, consumerization and mobile growth in 2012. Robert Stroud from ISACA offers tips to help manage the risks presented by these trends.