With the Obama administration's focus on cybersecurity, this is a good time to start or move into an information security career. And Regis University in Colorado is one institution offering state-of-the-art education for undergraduates and graduates alike.
In an exclusive interview, Daniel Likarish, faculty of the...
On Capitol Hill, expert witnesses testify about the need to beef up graduate-level education, not only to train needed cybersecurity professionals, but prepare the PhDs and others needed to educate IT security specialists. But just outside the Beltway that encircles Washington, community colleges - hoping to tap...
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
What are some of the key audit and risk trends to track? David Melnick of Deloitte answers that...
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;v
Potential career paths in cybersecurity.
With the Obama administration's focus on cybersecurity, this is a good time to start or move into an information security career. And Regis University in Colorado is one institution offering state-of-the-art education for undergraduates and graduates alike.
In an exclusive interview, Daniel Likarish, faculty of the...
Steve Katz was the world's first CISO, and he has unique insight on the information security profession - how it's developed and where it's headed.
In an exclusive interview, Katz discusses:
How the information security role has evolved;
Which trends are changing the role;
The skillsets necessary for today's...
Hard times have taken a toll everywhere - even when it comes to internal audit practices at financial institutions.
Yet, in the wake of security breaches and questionable business practices at some financial institutions, federal regulators are cracking down on auditors. In an exclusive interview, Holly Kidder, a...
Driving home every day along the New Jersey highways, I often see the signs offering "Save Your Home from Foreclosure" with a toll free number to call for more information.
It is the sign of the times. Foreclosure rescue scams are on the rise, along with mortgage fraud.
In these times of mergers and acquisitions in the banking industry, identity and access management (IAM) is a huge challenge.
Mike Del Giudice of Crowe Horwath LLP shares insights on:
IAM trends in financial services;
How banking institutions are tackling IAM challenges;
The 'gotchas' to avoid.
Del Giudice...
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;
Potential career paths in cybersecurity.
Nadia D. Short...
So, General Motors files for bankruptcy today. Whoever thought such an event would unfold in our lifetimes - that the U.S. leader in one of the top industries of the 20th century would sputter into the 21st and end up broken down beside the road, like a car whose owner neglected to heed the "Check engine" light?
There are more opportunities than ever for skilled information security professionals.
This is the belief of Gerald Masson, Director of Johns Hopkins University Information Security Institute, and in an exclusive interview he discusses:
Job prospects for information security professionals in the public and...
The National Cryptologic Museum (NCM) is the National Security Agency's principal gateway to the public, opening its doors in December 1993. Located adjacent to NSA Headquarters in Ft. George G. Meade, MD., the museum houses thousands of artifacts that collectively serve to sustain the history of the cryptologic...
"Cryptology is as old as mankind itself and dates from antiquity," says Patrick Weaden, curator at the National Cryptology Museum. People very early on realized that they needed to share certain information with certain people, so they developed devices to protect that information. Cryptology is the art and science of...
It's "tweet" time! Information Security Media Group (ISMG) has just registered with Twitter.com to start providing regular updates to audience members who also are enjoying the tweet life.
OK, so I know some of you out there are still kinda dying to know, but don't dare to ask - what is Twitter?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.