IT security leaders rely on penetration testing to determine whether applications are secure. But penetration tests can't be a primary source of assurance, says Jeff Williams, co-founder of OWASP.
To keep up with emerging technologies and strengthen focus on IT risk and compliance issues, ISACA has recently updated its Certified Information Security Manager exam. Read about the key changes.
Improved collaboration and communication between small businesses and financial institutions is the first step toward improving online security, says Mark Patterson, an ACH fraud victim. What else would help?
Security managers need the heads up from non-IT executives before they dismiss employees, some of whom might seek payback for their sacking by pilfering data or sabotaging systems, Carnegie Mellon University's Dawn Cappelli and Mike Hanley say.
People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand.
"We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate...
The insider poses one of the greatest and most damaging security risks any organization faces. So why do so many institutions fail when it comes to addressing this most obvious security risk?
Pace University's Seidenberg Cyber Security Institute plans to leverage public-private partnerships - a challenge for educational institutions. How will the institute help the private and public sectors meet their security needs?
Outrageous Facebook behavior by a contractor at a California hospital offers an eye-opening reminder about the need for a zero-tolerance policy when it comes to privacy violations.
Regulators push tougher cybersecurity measures. But the challenge for smaller organizations isn't compliance - it's budgets. Wendy Nather of 451 Research defines the 'Security Poverty Line' and what to do about it.
The information security job market is evolving into highly specialized areas, says Eugene Spafford, noted professor at Purdue University. So, how must students now prepare themselves for these new career paths?
These new sites now make Information Security Media Group the largest global network of information security-focused media sites, reaching the most diverse audience of decision-makers in each of ISMG's key markets.
Fraud threats have changed little in the past decade. But their global scale has, and James Ratley, president of the ACFE, details how fraud examiners must change their approach to fighting these crimes in 2012.
A U.S. Supreme Court decision not to review a California privacy case involving disclosing medical records to credit agencies appears to help bolster the state's strong medical privacy law.
Sen. Joseph Lieberman is no Don Quixote, but as a leader on Capitol Hill on all matters cybersecurity, the Connecticut Independent Democrat has a lot invested in getting his dream of enactment of comprehensive cybersecurity legislation before he retires from Congress next year.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.