Information security - it's now a major national priority, and it's also the subject of a new Master's of Science program at East Stroudsburg University. This unique, online graduate program debuts on Aug. 31, and in an exclusive interview ESU professor N. Paul Schembari discusses:
The program's unique...
It's a marriage made in heaven, if your the tropical island of Oahu as paradise.
In 2005, newly elected Honolulu Mayor Mufi Hannemann assembled the city's public safety and IT officials together to develop an integrated security program, forming a public safety oversight committee, chaired by chief information...
In this white paper, Jon Oltsik, Principal Analyst at ESG, cuts through the hype and provides recommendations to protect your organization's data, with today's budget. Oltsik shows you where to start, how to focus on the real threats to data, and what actions you can take today to make a meaningful contribution to...
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
The Heartland Payment Systems (HPY) data breach came as an unpleasant surprise to many financial institutions and their customers in early 2009. What are the threats we should eye as we look ahead to 2010?
In today's banking world, the importance of a comprehensive, reliable and scalable security infrastructure has never been greater. Thales HSMs have been used for over 25 years by a large number of banks worldwide mainly to protect customer PINs during credit and debit card transaction processing.
More recently...
The NISP Operating Manual (NISPOM) prescribes the requirements, restrictions, and other safeguards necessary to prevent unauthorized disclosure of classified information by US Government Executive Branch departments and agencies. NISPOM Chapter 8 addresses information-system security procedures and...
In the fall of 2006, Los Alamos Laboratory was faced with performing an audit of the organization's cyber security systems, including inspections of its safeguards and security functions.
This case study outlines how Los Alamos Labs' complex heterogeneous IT environment needed a solution that provided centralized...
Facebook, Linkedin, Twitter.com. These are just a few of the most popular social networking websites that are used extensively to find, meet and greet new people through a vast array of advanced web tools.
Social networking sites allow individuals and organizations to build communities. But just as social...
With the Obama administration's focus on cybersecurity, this is a good time to start or move into an information security career. And Regis University in Colorado is one institution offering state-of-the-art education for undergraduates and graduates alike.
In an exclusive interview, Daniel Likarish, faculty of the...
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
What are some of the key audit and risk trends to track? David Melnick of Deloitte answers that...
Georgia Tech professor sees computers with wireless connections as likely furnishing unprecedented opportunities for criminals, hackers, terrorists, spies and other unsavory actors.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.