From the Heartland data breach to the new Massachusetts data protection law, privacy is the hot topic in business and government.
In an exclusive interview, Peter Kosmala, assistant director of the International Association of Privacy Professionals (IAPP), discusses:
The top privacy topics in business and...
It's a simple proposition for successful applicants to the Scholarship for Service (SFS) Program: Get your information security education paid for, and then come work for the U.S. government.
"It's one of the most generous scholarships I've ever seen," says Victor Piotrowski, Lead Program Director of SFS for the...
From the Heartland data breach to the new Massachusetts data protection law, privacy is the hot topic in business and government.
In an exclusive interview, Peter Kosmala, assistant director of the International Association of Privacy Professionals (IAPP), discusses:
The top privacy topics in business and...
The National Security Agency (NSA), through the National INFOSEC Education and Training Program (NIETP), identifies 95 universities that conform to its standard for acceptable programs in information security today. Criteria for that determination are derived from recommendations of the National Security...
Identity and access management (IAM) deals with how users within an organization are given an identity - and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the...
The down economy pressures organizations to reduce operational expenses and discard many capital-intensive IT and security projects. What gets left behind often is a skeletal staff dealing with very basic day-to-day IT functions, with no time or resources to dedicate toward compliance, audit and core security...
"Jobless recovery." That's one term used by observers to describe today's economy. It means that the economy is slowly improving, but without the corresponding growth in hiring and new job creation.
What's the difference between cybersecurity and information security? It's in the eye of the beholder, according to retired Lt. Gen. Harry Raduege, who co-chaired the Commission on Cybersecurity for the 44th Presidency. He noted that the two terms are used synonymously, though cybersecurity - at least in the federal...
Because of the economic conditions, risks to organizations - from the inside and out - are at a critical high. Risk managers at public and private organizations are forced to make careful decisions on how to invest scarce resources.
In an exclusive interview, Joe Restoule, President of the Risk and Insurance...
Despite the recession and record job losses, information security remains a top concern for public and private sector organizations. But what can security professionals do to protect their careers and be considered for these jobs?
In an exclusive interview, Pat Myers, chair of (ISC)2, discusses:
Top security and...
Cybersecurity is a major priority of the Obama Administration, and at Carnegie Mellon University's Software Engineering Institute, it's a key component of the CERT Program's Survivability and Information Assurance (SIA) curriculum.
In an exclusive interview, Lawrence Rogers, chief architect of the SIA program,...
Because of the economic conditions, risks to organizations - from the inside and out - are at a critical high. Risk managers at public and private organizations are forced to make careful decisions on how to invest scarce resources.
In an exclusive interview, Joe Restoule, President of the Risk and Insurance...
Despite the recession and record job losses, information security remains a top concern for public and private sector organizations. But what can security professionals do to protect their careers and be considered for these jobs?
In an exclusive interview, Pat Myers, chair of (ISC)2, discusses:
Top security and...
As financial institutions and other organizations continue to lay off professionals in this economic recession, the ones left standing face the big question: How do I protect my career?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.