"A really secure cyber environment is as much about people and habits and culture as it is about machines," DHS Secretary Janet Napolitano tells RSA 2010 Conference attendees.
So, I snuck into San Francisco two days early this year, thinking I'd enjoy some quiet time in the press room of the Moscone Center on the eve before the real kickoff of the 2010 RSA Conference.
Boy, was I wrong.
From blogs to wikis, Facebook to Twitter, social media have taken over the workplace.
But how do security leaders manage social media before all these new tools and technologies become unmanageable?
It's been almost a year since the Financial Crimes Enforcement Network (FinCEN) issued its red flag advisory about foreclosure scams. Now it looks like the agency sees another spike in mortgage modification scams hitting the U.S.
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
The Information Security Today Career Trends Survey identifies three distinct education trends re: information assurance:
Information security professionals seek advanced degrees;
Organizations are footing at least part of the bill for training;
Online education is an increasingly common and effective...
Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...
Richard Chambers, President of the Institute of Internal Auditors (IIA) has three words of advice for organizations, executives and auditors looking to improve the role of internal audit: "Follow the risk."
In an exclusive interview, Chambers discusses:
Impact of the economic recession on internal audit;
How...
When it comes to enterprise security, an organization gets its tone from the top - even when the tone is set accidentally.
How do you set the right tone? That's the topic of the new book from former CISO Jennifer Bayuk: "Enterprise Security for the Executive: Setting the Tone from the Top."
In an interview about...
Dena Haritos Tsamitis has an ambitious goal for the year: to improve cyber awareness among 10 million people globally.
The Director of Education, Training and Outreach at Carnegie Mellon University's CyLab, Dena discusses:
The cyber awareness challenge among people of all ages;
Effective techniques for...
The rules of job seeking are in constant flux - particularly in information security, where job demands and requirements are ever-evolving.
Where does that leave a job seeker looking to stand out from the crowd?
The following are strategies offered by information security hiring managers:
Social media sites are changing the rules of job search, offering a new relationship-based approach that allows individuals and organizations to build communities through online profiles, affinity groups and networks of contacts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.