The fourth installment of our five-part series on this year's top five federal cybersecurity challenges looks at the information security implications of cloud computing, which is being championed by Federal CIO Vivek Kundra.
You've heard of Stephen Covey's "The Seven Habits of Highly Effective People?"
Well, information security leaders also must cultivate healthy habits to proactively manage their careers. Following are the 8 essential habits identified by successful security leaders:
As Congress returns to Washington for the second session of the 111th Congress, GovInfoSecurity.com presents - on each weekday - the top five cybersecurity challenges the federal government will face in 2010.
People who surf the Internet, as did motorists who drove their Model Ts a century ago, toss safety to the wind. Because carmakers faltered, the government stepped in with regulations to assure auto safety and might be poised to do the same with the Net.
The Advanced Persistent Threat - what exactly is it, and how are organizations vulnerable?
Ron Gula, CEO of Tenable Network Security, explains the threat and the challenges to mitigating it. In an exclusive interview, Gula discusses:
Why some organizations are especially vulnerable;
Strategies and solutions...
Information security is the hot career option for professionals in 2010 and beyond.
This is the prediction of David Foote of Foote Partners, the FL-based consultancy that tracks IT skills and competencies. In a look ahead at 2010 and beyond, Foote discusses:
the security careers "bubble" and how it began;
The New Year comes with fresh perspectives on priorities to be addressed by information security leaders.
To get a sense of what's top-of-mind, we went to three information security leaders:
Emil G. D'Angelo, International President of ISACA. He is also the senior Vice President overseeing the corporate data...
"Cyber-attacks are increasing exponentially and we need to get serious about America's cybersecurity - our nation's public and private infrastructure is too critical to remain vulnerable and unprotected," Sen. Jay Rockefeller says.
The University of Dayton (UD) and the Advanced Technical Intelligence Center (ATIC) have partnered to address the shortage of skilled information security professionals within government and businesses.
Starting now, students in the masters in business administration program (MBA) at UD will have the option of...
Risk management and effective security controls are on every organization's agenda, and responding to this market demand is ISACA (formerly known as the International Information Systems Auditing and Control Standards), which introduces a new risk-related certification for IT risk professionals.