Interview with Jay Foley of the Identity Theft Resource
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010.
This is the warning from Jay Foley, executive director of the Identity Theft Resource Center. In an exclusive...
How much do you actually know about time and the critical role it plays in your organization?
In a preview of his new webinar, Time: The Hidden Risks -- How to Create Compliant Time Practices, Bill Sewall discusses:
Why time is such a critical business issue;
Risks and opportunities presented by time;
One of the objectives of FISMA reform is to promote real-time metrics to determine IT security, but NIST senior scientist Ron Ross discusses new guidance he co-authored that achieves some of the goals without the need of legislation.
The breach is the latest of many cyber assaults that have plagued the space agency, which experienced 1,200 security incidents in 2007 and 2008, resulting in the installation of malicious code and unauthorized access to sensitive information.
No question, the information security professional's role has evolved in recent years. How, then, has the need for ongoing professional education also changed? And what role must risk management play in today's security organization?
In an exclusive interview, Mark Lobel of PricewaterhouseCoopers and ISACA,...