The need for qualified security pros is growing - but so is the Scholarship for Service Program, which helps students train for roles in government. Victor Piotrowski of the National Science Foundation discusses the opportunities.
"I'll probably be hanged for this, but I really believe the cloud can be more secure than what we do today," says Tom Soderstrom, chief technology officer at NASA's Jet Propulsion Laboratory.
Not all hackers are the same, and that presents problems in defending against them. Understanding each type of hacker can help organizations better prepare for digital assaults.
"This is a unique program that fits the specific needs for upcoming and current IT security leaders and adds high enrichment to peer support and the learning experience," says Dena Haritos Tsamitis.
The National Institute of Standards and Technology is establishing the National Cybersecurity Center of Excellence, a public-private collaboration aimed at accelerating the widespread adoption of integrated cybersecurity tools and technologies.
"The role of expert witness will only become more critical as our dependency on electronic data increases," says Eric Cole, who offers tips on how to pursue these opportunities.
Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.
RSA Conference 2012 opens Feb. 27 in San Francisco, and for the third straight year Information Security Media Group will be a Platinum Media Sponsor. What's on the agenda at this world-class security event?
What are today's key hiring factors? What are the top skills needed from information security professionals in 2012? See the results of a new Career Impact Survey just released by (ISC)2.
To build an effective information security program, organizations and leaders need to take seven essential steps, including updating a risk assessment, says consultant Tom Walsh.
The concept of time supported dueling views, presented at a congressional hearing, on the need for more stringent government regulations to protect the nation's critical information infrastructure.
In the wake of the latest hacktivist attacks against high-profile institutions, industry experts offer these tips to bolster online security, customer awareness and the corporate image.
Two of the American government's most IT-security sensitive organizations - the Army and National Security Agency - are looking for ways to employ smartphones to access selected IT systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.