IT security leaders rely on penetration testing to determine whether applications are secure. But penetration tests can't be a primary source of assurance, says Jeff Williams, co-founder of OWASP.
Dice.com reports a 79 percent increase in the total number of information security jobs posted to its site. What are the five hottest career prospects for aspiring pros?
Ohio is relatively new to enterprise information security, and according to David Shaw, the state's chief information security officer, there is still much to do to ensure that all the agencies' critical infrastructure is protected.
Give a man a fish, you feed him for today, the proverb says. Teach a man to fish; and you feed him for a lifetime. That adage can be applied to information security, as well.
Northrop Grumman Cybersecurity Research Consortium's Robert Brammer says IT security researchers should think like Wayne Gretzky, the National Hockey League hall of famer: Skate to where the puck will be.
"Ethical hacking" - is the term an oxymoron, or is it one of today's necessities in the fight against cybercrime? Jay Bavisi, president and co-founder of the EC Council, feels strongly about why we need ethical hackers more today than ever before.
Chris Painter knows that the United States must determine what are the standard behavioral practices on the Internet before achieving substantial international agreements on cybersecurity.
Ian Glover, president of the UK's Council of Registered Ethical Security Testers, has a message for individuals who want to enter the security testing profession today: No hackers allowed, thank you.
Philip Reitinger, the top cybersecurity official in the Department of Homeland Security, is on a mission to help create a new, secure computing ecosystem on the Internet.
Incidents such as the WikiLeaks disclosures and resulting fallout push leaders to redefine their data protection agenda for 2011 and think about their organizations' vulnerabilities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.