It is an age old question: Who really is in charge of security? A look back into history, one can see the origination of the word "password" and how it came from the guard at the gate of a city or castle, who upon approached, would say "Halt, who goes there?"
From the Heartland data breach to the new Massachusetts data protection law, privacy is the hot topic in business and government.
In an exclusive interview, Peter Kosmala, assistant director of the International Association of Privacy Professionals (IAPP), discusses:
The top privacy topics in business and...
The National Security Agency (NSA), through the National INFOSEC Education and Training Program (NIETP), identifies 95 universities that conform to its standard for acceptable programs in information security today. Criteria for that determination are derived from recommendations of the National Security...
Angry about the Heartland data breach?
Anxious because you have an upcoming regulatory exam?
Frustrated by the effects of the global recession, and wondering when the heck we're going to climb out of it?
Identity and access management (IAM) deals with how users within an organization are given an identity - and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the...
The down economy pressures organizations to reduce operational expenses and discard many capital-intensive IT and security projects. What gets left behind often is a skeletal staff dealing with very basic day-to-day IT functions, with no time or resources to dedicate toward compliance, audit and core security...
Fearful of man-made, natural and pandemic disasters, organizations everywhere are adopting or improving business continuity/disaster recovery programs.
And at Norwich University, there now is a Master's of Science in Business Continuity program for mid-career professionals to hone their skills in this in-demand...
"Jobless recovery." That's one term used by observers to describe today's economy. It means that the economy is slowly improving, but without the corresponding growth in hiring and new job creation.
What's the difference between cybersecurity and information security? It's in the eye of the beholder, according to retired Lt. Gen. Harry Raduege, who co-chaired the Commission on Cybersecurity for the 44th Presidency. He noted that the two terms are used synonymously, though cybersecurity - at least in the federal...
Because of the economic conditions, risks to organizations - from the inside and out - are at a critical high. Risk managers at public and private organizations are forced to make careful decisions on how to invest scarce resources.
In an exclusive interview, Joe Restoule, President of the Risk and Insurance...
Despite the recession and record job losses, information security remains a top concern for public and private sector organizations. But what can security professionals do to protect their careers and be considered for these jobs?
In an exclusive interview, Pat Myers, chair of (ISC)2, discusses:
Top security and...
Every day I'm driving to or from work -- or even on the weekends - it seems like I hear about some new urgent priority that I must be aware of, whether it be the flailing economy, President Obama's directives, data breaches, or any number of other news-worthy items. But I love the news - so I don't mind!
Clearing my desk and my head this morning...
Interesting nuance in the Heartland Payment Systems breach this week. Did you read the article about Visa and the security update it's presenting to its network of processors? In one part of this presentation, Visa discusses myths and facts about PCI DSS compliance, and...
Cybersecurity is a major priority of the Obama Administration, and at Carnegie Mellon University's Software Engineering Institute, it's a key component of the CERT Program's Survivability and Information Assurance (SIA) curriculum.
In an exclusive interview, Lawrence Rogers, chief architect of the SIA program,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.