In an all-too typical good news, bad news audit, The Department of Homeland Security's inspector general says the agency's top secret/sensitive compartmented information system has made significant progress in its IT security program, but more must be done to meet requirements under the Federal Information Security...
You've spent years in information security, toiling your way to the top - to the CISO role. What's next? What are your career options, and how should you prepare for exploring them?
Jennifer Bayuk is the former CISO at Bear Stearns & Co. She became an independent consultant after the company was acquired by...
So, the Obama administration has presented its cybersecurity plan establishing the practice as a major, new national priority.
What does this mean for information security careers?
Security experts that work closely with the government offer insights on the direction the new administration has taken regarding...
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
The Heartland Payment Systems (HPY) data breach came as an unpleasant surprise to many financial institutions and their customers in early 2009. What are the threats we should eye as we look ahead to 2010?
The head of the information security certification group says certification is not a silver bullet, but serves as a critical metric in determining a federal government cybersecurity pro's qualifications.
The International Information Systems Security Certification Consortium (ISC2) has recently launched an online information security course, the Live Online Official ISC2 Certified Information Systems Security Professional Common Body of Knowledge Review Seminar.