"Regulation drives spending," says George Tubin of GT Advisors. "You're in a situation where the regulators are telling you, 'You have to do something; you have to make improvements.' Therefore, the bank has to spend some money on technology."
One problem tracking IT security employment is the dearth of information. Even the most trustworthy organization in collecting employment data, the Bureau of Labor Statistics, furnishes infosec data it cautions aren't reliable.
Ignorance is not bliss. Two new studies, when viewed together, show that consumers' ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.
The cost of a data breach is down, say the latest Ponemon Institute study. But as the Global Payments breach shows, organizations still have many reasons to be concerned, says researcher Larry Ponemon.
Cloud services are being adopted increasingly by organizations. But with adoption comes increased concern, says Symantec's Francis deSouza. How can organizations deploy cloud security to protect their data?
Creating a more trusted Internet ecosystem should help all types of enterprises and leaders implement identity management solutions that extend beyond usernames and passwords, White House Cybersecurity Coordinator Howard Schmidt says.
IPv6, known to some as the new Internet, is architected to be safer than IPv4, but that doesn't mean organizations shouldn't take steps to assure the security in Internet Protocol version 6, American Registry for Internet Numbers' John Curran says.