Hearing at a Senate Commerce subcommittee addresses smartphone apps that collect consumers whereabouts even though those application don't need to know the users locations to function.
More than just Facebook friends, today's Chief Information Security Officer needs to connect and collaborate with key corporate allies who can influence the enterprise risk and security practices within any organization.
A new (ISC)2 information security workforce survey projects the doubling of federal government IT security staffs from 27,000 employees today to more than 61,000 by 2015. What's behind this growth?
From Facebook to Twitter, the new era of business communication and collaboration requires involvement of senior leaders to guide an organization's social media strategy and engagement. It's a big role, and it comes with significant responsibilities.
Emerging technologies, application vulnerabilities and regulatory compliance force organizations to bridge the development and security silos and find avenues for interdisciplinary cooperation to produce secure software.
Tom Oscherwitz says consumers put themselves at risk by giving out too much personal information that is often used for online banking log-in credentials.
The information security profession is at a crucial turning point as professionals scramble to develop new skills in the arenas of cloud computing, mobile applications and social media, a new survey shows.
Sen. Al Franken, D-Minn., will head a new subcommittee on privacy, technology and the law, said Sen. Patrick Leahy, D-Vt., who chairs the Senate Judiciary Committee.
There's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants - they also can be abused.
Employment Screen Resources' Lester Rosen says there's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants, they also can be abused.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.