Provisions of the bill would help develop a skilled government infosec workforce, prioritize federal cybersecurity R&D, improve the transfer of cybersecurity technologies to business and promote cybersecurity education and awareness.
Dena Haritos Tsamitis has an ambitious goal for the year: to improve cyber awareness among 10 million people globally.
The Director of Education, Training and Outreach at Carnegie Mellon University's CyLab, Dena discusses:
The cyber awareness challenge among people of all ages;
Effective techniques for...
Risk management today - it's less about pure technology, more about business acumen and pure communication skills.
This is the position of Kenneth Newman, VP & Information Security Manager at Central Pacific Bank. In an interview about top risk management trends, Newman discusses:
Scope of the risk management...
Passwords are the bane of my existence -- probably yours, too. In order to be a good, secure, computer and Internet user, ideally I should have a different password for every single application I use, website I register to, and place I visit on the Internet. I frequently have at least 10 to 15 different passwords and...
In the wake of major security incidents such as the Heartland Payment Systems data breach, critics have focused on the perceived flaws of the Payment Card Industry Data Security Standard (PCI) and the role of qualified security assessors (QSAs).
Following are five myths and realities detailed by PCI compliance...
The Payment Card Industry Data Security Standard (PCI) is one of the hottest topics in information security today. And PCI Quality Security Assessors (QSAs) are among the most sought-after of security professionals.
What, then, does it take to become a QSA?
When it comes to enterprise security, an organization gets its tone from the top - even when the tone is set accidentally.
How do you set the right tone? That's the topic of the new book from former CISO Jennifer Bayuk: "Enterprise Security for the Executive: Setting the Tone from the Top."
In an interview about...
Career Insights from Srinvivas Mukkamala of New Mexico Tech.
Education, skills, experience - what exactly does it take to make it in an information security career today?
Srinivas Mukkamala, an educator and practitioner, offers unique insight on:
The necessary mindset for an information security professional;...
Johns Hopkins University's-Whiting School of Engineering is now offering a new part-time graduate program in information security.
This MS degree program is an effort toward filling the surging demand for cyber engineers and scientists with technical expertise in information assurance (IA) within government and...
Credit reports, social networks and international background checks - these are three of the hottest topics in employment background screening, according to Employment Screening Resources (ESR), a CA-based firm.
In an exclusive interview, Lester Rosen, President and CEO of ESR, discusses:
The top 10 trends in...
With Howard Schmidt's appointment as national cybersecurity coordinator, his role as president of the Information Systems Security Association (ISSA) has been filled by Kevin Richards, a risk management advisor with Crowe Horwath.
In an exclusive interview, Richards discusses:
Top agenda items for ISSA in...
Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.