Army Gen. Keith Alexander, the head of the U.S. military's Cyber Command and National Security Agency, paints a bleak picture with mounting challenges to the Defense Department's and nation's IT systems at a House hearing.
Banking institutions have fought phishing and ACH fraud, but increasingly fraudsters are exploiting call centers. Where are the vulnerabilities and how can institutions fight back?
An Oregon nursing assistant spent eight days in jail for invasion of personal privacy on Facebook. The case provides an eye-opening lesson about the consequences of misusing social media.
What skills are needed to be an effective fraud examiner? My short answer is that, as with any discipline, there are certain skills and areas of knowledge one needs to learn to be successful.
The privacy profession is evolving, says Kirk Herath, Chief Privacy Officer of Nationwide Insurance. For those who are new to the role, Herath offers three pieces of advice.
Commerce Undersecretary for Standards and Technology Patrick Gallagher sees the private sector, not government, taking the lead to develop tools, processes and standards to help safeguard IT systems and data in and out of government.
Imperva would neither confirm nor deny it helped defend the Vatican website from a hacktivist assault last year, but the IT security provider's director of security, Rob Rachwald, explains how such an attack was constructed and defended.
Cisco has announced a major update to Cisco CCNA and CCNP security certifications to deliver specialized training in IT security to meet the needs of emerging technologies.
The need for qualified security pros is growing - but so is the Scholarship for Service Program, which helps students train for roles in government. Victor Piotrowski of the National Science Foundation discusses the opportunities.
"I'll probably be hanged for this, but I really believe the cloud can be more secure than what we do today," says Tom Soderstrom, chief technology officer at NASA's Jet Propulsion Laboratory.
Not all hackers are the same, and that presents problems in defending against them. Understanding each type of hacker can help organizations better prepare for digital assaults.
"This is a unique program that fits the specific needs for upcoming and current IT security leaders and adds high enrichment to peer support and the learning experience," says Dena Haritos Tsamitis.
The National Institute of Standards and Technology is establishing the National Cybersecurity Center of Excellence, a public-private collaboration aimed at accelerating the widespread adoption of integrated cybersecurity tools and technologies.
"The role of expert witness will only become more critical as our dependency on electronic data increases," says Eric Cole, who offers tips on how to pursue these opportunities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.