Incidents such as the WikiLeaks disclosures and resulting fallout push leaders to redefine their data protection agenda for 2011 and think about their organizations' vulnerabilities.
Delaware has implemented filters that block unencrypted messages containing the numeric pattern of Social Security numbers: three digits, two digits, four digits, state Chief Security Office Elayne Starkey says.
"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
Data centers are part of an ever changing world with challenges of high energy consumption, labor costs, data silos and growth in data volume. Learn how to meet these challenges with IBM's cohesive strategy for the development of a dynamic infrastructure, while also laying the foundation for a highly responsive...
Could methods employed by the World Health Organization to quarantine people to prevent the spread of deadly diseases be a roadmap on how to prevent virtual viruses from spreading in the cyberworld?
Two weeks after authorities on two continents arrested cyber criminals linked to the Zeus malware, Microsoft has added the infamous Trojan's signature to one of its best removal tools in an effort to hunt down infected machines.
Businesses are faced with an assortment of security risks. Among the most prevalent risks are network attacks and infected computing systems (servers and end-user endpoints). The consequences of loss of use - that is, network failures and out-of commission computing systems - are just too great for any business to...
From ATM skimming to the Zeus malware, credit and debit cards are under increased attack by fraudsters, and organizations need to step up their efforts to protect their customers - and themselves. What steps can you take to avoid being the next payment card fraud victim?
Join Kimberly Peretti, former senior...
What will be the hottest skills and competencies within information security in 2010?
Application security and biometrics are among the in-demand skills, according to the latest quarterly published list of the 2009 IT Skills Pay and Demand Trends Report by Foote Partners, LLC.
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber...
2009 was a tough year in many ways -- economic recession, massive layoffs, high unemployment rate, scores of bank failures.
But there is good news for information security professionals looking for jobs within the public and private sectors in 2010. There are jobs aplenty, thought leaders say, for information...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.