Jobs no longer are aligned with a predefined assignment, but are dynamic, requiring critical thinking and the ability to navigate technology to determine how best to perform a variety of tasks, Ruby DeMesme says.
Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
Einstein is an intrusion detection - and soon an intrusion prevention - system the government is deploying to safeguard government IT systems. Some cybersecurity experts contend Einstein has the potential to intrude on the privacy of individual Americans, a concern Philip Reitinger dismisses.
The Advanced Persistent Threat - what exactly is it, and how are organizations vulnerable?
Ron Gula, CEO of Tenable Network Security, explains the threat and the challenges to mitigating it. In an exclusive interview, Gula discusses:
Why some organizations are especially vulnerable;
Strategies and solutions...
Don't expect the appointment of Howard Schmidt as cybersecurity coordinator to quiet the hullabaloo surrounding the position. Some influential lawmakers want to enact legislation to elevate the post within the White House.
The unauthorized publishing on a government website last May of a document revealing information on civilian nuclear sites was the shared fault of all of the agencies involved in creating it, the Government Accountability Office reports.
Mischel Kwon, Former DirectorU.S. Computer Emergency Readiness Team
The growing role of the Department of Homeland Security in governing federal cybersecurity has its limits, says Mischel Kwon, who until this summer served as director United States Computer Emergency Readiness Team, the DHS agency that analyzes...
What's ahead for information security professionals in 2010?
Barbara Massa, VP of Global Talent Acquisition at McAfee, Inc. speaks to the results of the new Information Security Today Career Trends Survey, discussing:
How the results speak to the maturity of the information security profession;
What will be the hot information security jobs in 2010?
How will professionals grow their skills - and will their employers foot the bill?
What are the minimum academic and professional requirements for information security professionals and leaders today?
These are among the key questions answered in the...