Pace University's Seidenberg Cyber Security Institute plans to leverage public-private partnerships - a challenge for educational institutions. How will the institute help the private and public sectors meet their security needs?
The insider poses one of the greatest and most damaging security risks any organization faces. So why do so many businesses and institutions fail when it comes to addressing this most obvious security risk?
Employment among IT security professionals in the U.S. rose significantly throughout 2011, as unemployment virtually was nonexistent among those with cybersecurity skills, according to our analysis of government data.
Regulators push tougher cybersecurity measures. But the challenge for smaller organizations isn't compliance - it's budgets. Wendy Nather of 451 Research defines the 'Security Poverty Line' and what to do about it.
The information security job market is evolving into highly specialized areas, says Eugene Spafford, noted professor at Purdue University. So, how must students now prepare themselves for these new career paths?
These new sites now make Information Security Media Group the largest global network of information security-focused media sites, reaching the most diverse audience of decision-makers in each of ISMG's key markets.
As 2012 nears and federal regulators prepare to examine financial institutions for conformance with the FFIEC Authentication Guidance, just how prepared are banks and credit unions? The answer may surprise you.
Fraud threats have changed little in the past decade. But their global scale has, and James Ratley, president of the ACFE, details how fraud examiners must change their approach to fighting these crimes in 2012.
"We will provide critical infrastructure owners and operators the timely access to actionable cybersecurity information necessary to protect their own networks and facilities," says one of bill's chief sponsors, Rep. Dan Lungren.