Rep. David Wu helps shepherds legislation through Congress that would increase the National Institute of Standards and Technology involvement in developing new ways to help protect the nation's IT infrastructure.
"As those attackers get better and better, it is incumbent upon us in government and frankly in the private sector to continue to do better job of addressing the threat," says Deputy Undersecretary Philip Reitinger, the top cybersecurity official at DHS.
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare.
The 10 most significant events regarding government cybersecurity in 2009 saw its genesis with the inauguration of a Blackberry-toting chief executive, the most tech-savvy president to occupy the Oval Office.
Interview with Jay Foley of the Identity Theft Resource Center
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010. This is the warning from Jay Foley, executive director of the Identity Theft Resource Center.
Jobs no longer are aligned with a predefined assignment, but are dynamic, requiring critical thinking and the ability to navigate technology to determine how best to perform a variety of tasks, Ruby DeMesme says.
Don't expect the appointment of Howard Schmidt as cybersecurity coordinator to quiet the hullabaloo surrounding the position. Some influential lawmakers want to enact legislation to elevate the post within the White House.
The unauthorized publishing on a government website last May of a document revealing information on civilian nuclear sites was the shared fault of all of the agencies involved in creating it, the Government Accountability Office reports.
What's ahead for information security professionals in 2010?
Barbara Massa, VP of Global Talent Acquisition at McAfee, Inc. speaks to the results of the new Information Security Today Career Trends Survey, discussing:
How the results speak to the maturity of the information security profession;
What will be the hot information security jobs in 2010?
How will professionals grow their skills - and will their employers foot the bill?
What are the minimum academic and professional requirements for information security professionals and leaders today?
These are among the key questions answered in the...
What will be the hottest skills and competencies within information security in 2010?
Application security and biometrics are among the in-demand skills, according to the latest quarterly published list of the 2009 IT Skills Pay and Demand Trends Report by Foote Partners, LLC.
Information Security Media Group (ISMG) recently conducted its first annual Information Security Today Career Trends survey.
Based on survey results, here is a list of top 10 certifications most sought after by security professionals.