With baby boomers reaching the retirement stage, and the first throngs of Gen Y entering the information security workplace, the profession is evolving - and gaining new definition.
Our analysis of Bureau of Labor Statistics data suggests that discouraged workers who stopped looking for information technology jobs at the height of the recession have returned to the workforce with hopes of landing new positions.
Key federal agencies say they're moving slowly to implement most of the recommendations President Obama outlined in his May 2009 cyber policy review because the White House has yet to assign them roles and responsibilities.
Investing in science, technology and math, not only will produce needed cybersecurity pros, but will generate stronger economic growth in the coming decade, says Patrick Gorman, former associate director of national intelligence.
Organizations today approach social media one of three ways: They embrace it, ignore it or are immobilized by it. The key to success is to manage the transition.
Federal CIO Vivek Kundra has high hopes for CyberScope, which agencies are to use next month to report on their FISMA compliance. But 85 percent of agency CIOs and CISOs say they have yet to use the tool, a new survey reports.
"While these arrests may make some think twice, the vast majority of criminal enterprises will keep pursuing the millions to be made from flawed security systems." - Robert Siciliano, ID theft expert
A federal crackdown on ACH and wire fraud has produced 37 arrests of a money mule operation - part of what law enforcement is calling a sophisticated bank fraud scheme.
The curious fact about cybersecurity legislation before Congress is that nearly everyone sees a need for it, and there's no partisan bickering, yet few people see a comprehensive federal information security bill becoming law this year.
Despite maintaining an effective, enterprise program for its intelligence system, operational and oversight issues remain regarding its effectiveness, DHS's inspector general says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.