Fearful of man-made, natural and pandemic disasters, organizations everywhere are adopting or improving business continuity/disaster recovery programs.
And at Norwich University, there now is a Master's of Science in Business Continuity program for mid-career professionals to hone their skills in this in-demand...
"Jobless recovery." That's one term used by observers to describe today's economy. It means that the economy is slowly improving, but without the corresponding growth in hiring and new job creation.
What's the difference between cybersecurity and information security? It's in the eye of the beholder, according to retired Lt. Gen. Harry Raduege, who co-chaired the Commission on Cybersecurity for the 44th Presidency. He noted that the two terms are used synonymously, though cybersecurity - at least in the federal...
Because of the economic conditions, risks to organizations - from the inside and out - are at a critical high. Risk managers at public and private organizations are forced to make careful decisions on how to invest scarce resources.
In an exclusive interview, Joe Restoule, President of the Risk and Insurance...
Despite the recession and record job losses, information security remains a top concern for public and private sector organizations. But what can security professionals do to protect their careers and be considered for these jobs?
In an exclusive interview, Pat Myers, chair of (ISC)2, discusses:
Top security and...
Cybersecurity is a major priority of the Obama Administration, and at Carnegie Mellon University's Software Engineering Institute, it's a key component of the CERT Program's Survivability and Information Assurance (SIA) curriculum.
In an exclusive interview, Lawrence Rogers, chief architect of the SIA program,...
Cybersecurity is a major priority of the Obama Administration, and at Carnegie Mellon University's Software Engineering Institute, it's a key component of the CERT Program's Survivability and Information Assurance (SIA) curriculum.
In an exclusive interview, Lawrence Rogers, chief architect of the SIA program,...
We all know the risk of the insider threat is high, but what are the specific vulnerabilities for which organizations should be particularly vigilant?
In an exclusive interview, Randy Trzeciak of Carnegie Mellon's CERT program discusses recent insider threat research, including:
Patterns and trends of insider...
Fearful of man-made, natural and pandemic disasters, organizations everywhere are adopting or improving business continuity/disaster recovery programs.
And at Norwich University, there now is a Master's of Science in Business Continuity program for mid-career professionals to hone their skills in this in-demand...
Higher education hasn't been immune to the ravages of the recession economy. Scholarships and tuition reimbursements are tougher for students to come by, and career opportunities have diminished.
That said, job opportunities for information security students abound - in both the private and public sectors.
In an...
Higher education hasn't been immune to the ravages of the recession economy. Scholarships and tuition reimbursements are tougher for students to come by, and career opportunities have diminished.
That said, job opportunities for information security students abound - in both the private and public sectors.
In an...
Interview with Jody Westby, Adjunct Distinguished Fellow at CyLab and CEO at Global Cyber Risk
At a time when risks are high and consumer confidence is low, corporate boards of directors aren't paying nearly enough attention to information security and cyber threats.
This is the key takeaway from a new Carnegie...
The recession is officially here, and major banking institutions are announcing thousands of layoffs weekly. And, yet, now is a good time for information security professionals, whose skills and expertise are in greater demand than ever.
In this exclusive interview, W. Hord Tipton, Executive Director of (ISC)²,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.