A rapidly evolving threat landscape calls for the next generation of information security professionals to have strong technical and communications skills. Security leaders highlight their top requirements.
The cybersecurity jobs shortage isn't about a shortage of people. Rather, it's a lack of skills among those who consider themselves IT security professionals, says Alan Paller of SANS Institute.
With organizations racing to be the first-to-market with the latest, coolest app, they are forgetting something critically important: applying security principles in the development and deployment.
Organizations in 2013 will continue to explore new authentication solutions to improve user access to sensitive information. What are the specific solutions employed by this panel of security leaders?
The HIPAA Omnibus Rule stresses the need for business associates to adequately safeguard patient information. What are the implications? Here's what a federal privacy officer and a consumer advocate have to say.
The developers of a new healthcare-specific security credential that will be available later this year say it's needed to help fill a knowledge gap. But some others question whether the credential is necessary.
U.S. banks have been hit by a new wave of distributed-denial-of-service attacks, and experts say the botnet behind the attacks is getting stronger. Learn about the latest developments.
We are no longer facing a global IT security staffing shortage - it's a full-blown crisis. This is the conclusion of new research conducted by (ISC)². Julie Peeler and Bruce Murphy offer insight.
The National Initiative for Cybersecurity Careers and Studies leverages efforts of government, industry and academia to provide a comprehensive, single resource to address the nation's cybersecurity knowledge needs.
Malware, DDoS and mobile security aside, one of the biggest risks is organizations' lack of visibility into specific threats. Don Gray of Solutionary explains the need for actionable threat intelligence.
Organizations allowing BYOD often need to strike a balance between technology, convenience and policy enforcement. A roundtable of security experts offers insights on navigating the mobile landscape.
What skill sets and expertise make for the most seamless career transitions? Two industry experts, both with experience in banking and cybersecurity, share their perspectives.
As mobile devices and BYOD continue to expand their influence on the workplace, security leaders are faced with a growing set of data protection challenges, too, says CISO Tom Newton.
Security leaders have a firm grasp on their technology controls and processes as they continue into 2013. It's addressing the vulnerabilities in people that remains the outstanding challenge of the year.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.