Following is the latest state-by-state list of academic institutions selected and approved by the NSA and DHS as Centers of Academic Excellence in information assurance.
Good start, but we've still got a long way to go. This statement sums up industry experts' reactions to the two cyber fraud advisories issued this week to help organizations prevent ACH fraud and other crimes.
When it comes to business continuity and disaster recovery planning, it isn't the cause of the disaster that's the concern - it's the potentially devastating effects.
The level of application security threats is rising, but the level of response is not. "That's a serious disconnect," says Jeff Williams, chair of the OWASP Foundation.
To help fight fraud, computer scientists from the National Institute of Standards and Technology offer some insight on how to protect commercial and consumer computers from keylogger infection.
With baby boomers reaching the retirement stage, and the first throngs of Gen Y entering the information security workplace, the profession is evolving - and gaining new definition.
When it comes to business continuity and disaster recovery planning, it isn't the cause of the disaster that's the concern - it's the potentially devastating effects.
Organizations today approach social media one of three ways: They embrace it, ignore it or are immobilized by it. The key to success is to manage the transition.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.