From RSA 2010: Interview with Bob Russo, GM of the PCI Security Standards Council
How will the Payment Card Industry Data Security Standard (PCI DSS) be amended, and when?
These are the key questions in payments security, and Bob Russo, GM of the PCI Security Standards Council, is prepared to start answering...
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
The Information Security Today Career Trends Survey identifies three distinct education trends re: information assurance:
Information security professionals seek advanced degrees;
Organizations are footing at least part of the bill for training;
Online education is an increasingly common and effective...
Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...
Richard Chambers, President of the Institute of Internal Auditors (IIA) has three words of advice for organizations, executives and auditors looking to improve the role of internal audit: "Follow the risk."
In an exclusive interview, Chambers discusses:
Impact of the economic recession on internal audit;
When it comes to enterprise security, an organization gets its tone from the top - even when the tone is set accidentally.
How do you set the right tone? That's the topic of the new book from former CISO Jennifer Bayuk: "Enterprise Security for the Executive: Setting the Tone from the Top."
In an interview about...
From blogs to wikis, Facebook to Twitter, social media have taken over the workplace.
But how do security leaders manage social media before all these new tools and technologies become unmanageable?
Jerry Mechling is a prominent author and lecturer at the Harvard Kennedy School, and in an exclusive interview he...
Joe Bernik, a banking and security veteran, has recently joined Fifth Third Bank as its new CISO. Among his challenges: preventing external attacks and building better internal relationships with business partners.
In an exclusive interview, Bernik discusses:
The evolution of information security and risk...
The rules of job seeking are in constant flux - particularly in information security, where job demands and requirements are ever-evolving.
Where does that leave a job seeker looking to stand out from the crowd?
The following are strategies offered by information security hiring managers:
Social media sites are changing the rules of job search, offering a new relationship-based approach that allows individuals and organizations to build communities through online profiles, affinity groups and networks of contacts.
What must financial institutions do to improve security education?
Identity theft expert Robert Siciliano shares his thoughts on the need to change the mindset of financial institutions when it comes to educating their customers about identity theft and security issues. Among the topics he discusses: