Investing in science, technology and math, not only will produce needed cybersecurity pros, but will generate stronger economic growth in the coming decade, says Patrick Gorman, former associate director of national intelligence.
Organizations today approach social media one of three ways: They embrace it, ignore it or are immobilized by it. The key to success is to manage the transition.
We're in the middle of a national identity crisis, and the crisis is only getting worse. The National Strategy for Trusted Identities in Cyberspace is a solid step in the right direction, but it's a strategy, not an implementation guide.
Defense contractors need hands-on candidates who can understand the technical and business issues within the government. Problem is: The demand for these candidates is clearly ahead of the current supply.
For most organizations, the biggest barrier to cloud computing is fear - "Will my data be secure?" It's time to tackle that fear head-on, says Jeff Reich, director of the Institute of Cybersecurity at the University of Texas, San Antonio.
Cybersecurity is truly a bipartisan issue in Congress, but measures aimed at enhancing the protection of military IT systems fell victim to political squabbling over the repeal of the don't ask, don't tell policy on gays in the military.
Responding to market demand is ISACA, the non-profit security organization, which launched the Certified in Risk and Information Systems Control certification for IT risk professionals early this year.
It was with a bit of puzzlement and skepticism that I closed my afternoon yesterday by reading two recent reports about future card and cash use in Europe.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.