An (ISC)2 survey suggests that a Commission on Cybersecurity for the 44th Presidency paper backs a government-run board to oversee IT security certifications, a point disputed by the report's author. Where does the truth lie?
"The effort with which an organization can recognize, analyze and respond to an incident will limit the damage and lower the cost of recovery," says Don Weber, former incident response professional at IBM.
Information security incidents are more sophisticated - and so are the criminals who perpetrate them. This raises the bar for professionals seeking careers in incident response in 2011.
Real stories about real information security challenges - and in real, conversational English. These are the qualities of Michael Seese's books, Scrappy Information Security and Scrappy Business Contingency Planning.
The story of Nazreen Mohammed shows a new level of over-the-top insider fraud and that sometimes good judgment is thrown away when a mother wants to help her son.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.