"To date, Congress has not spent as much time on cybersecurity as transportation security, and that has to change," the Senate Commerce, Science and Transportation Committee chairman says. "That's our fault."
Cybersecurity, forensics, risk management -- what will be the core security skills needed in organizations in 2010?
In an exclusive interview, Kent Anderson, founder and managing director of Encurve LLC, as well as a member of ISACA's Security Management Committee, discusses:
The core security skills now needed...
2009 was a tough year in many ways -- economic recession, massive layoffs, high unemployment rate, scores of bank failures.
But there is good news for information security professionals looking for jobs within the public and private sectors in 2010. There are jobs aplenty, thought leaders say, for information...
GAO's Cathleen Berrick says DHS has made progress in strengthening cybersecurity, such as addressing some lessons learned from a cyber attack exercise, but further actions are warranted to address five critical concerns.
What have been the biggest privacy issues of 2009, and what emerging trends should you watch heading into 2010?
We posed these questions to J. Trevor Hughes, Executive Director of the International Association of Privacy Professionals (IAPP). In an exclusive interview, Hughes discusses:
The role of the...
It's time for information security professionals to give back to their communities - to reach out and educate businesses, schools and citizens about cybersecurity and other relevant issues.
This is the message from John Rossi, professor of systems management/information assurance at National Defense...
Cyber threats moving at Internet speed is making it difficult for the government and the private sector to protect key digital assets, says the official who conducted President Obama's 60-day cybersecurity review.
As America's networked systems' gaping security hole widens, the number of actors who can exploit computers for illegal, harmful and devastating purposes continues to rise, writes a leading FBI cybersecurity official.
Congress enacted the current law when the Net was a mere babe used by a few university researchers and military strategists, and decades before multimedia bells and whistles were added to make it today's primary communications channel.
FaceBook, Twitter, LinkedIn -- Social-networking sites are now used both as recruitment tools for new talent and as screening sites for potential employees. As such, information security professionals should be careful to cultivate the right image on these and other popular sites.
The fact that new technologies and trends present new threats to government information systems isn't new, but research from the privacy and IT security think tank Ponemon Institute links particular technologies or trends to specific vulnerabilities.