Hard times have taken a toll everywhere - even when it comes to internal audit practices at financial institutions.
Yet, in the wake of security breaches and questionable business practices at some financial institutions, federal regulators are cracking down on auditors. In an exclusive interview, Holly Kidder, a...
There are more opportunities than ever for skilled information security professionals.
This is the belief of Gerald Masson, Director of Johns Hopkins University Information Security Institute, and in an exclusive interview he discusses:
Job prospects for information security professionals in the public and...
It's a simple proposition for successful applicants to the Scholarship for Service (SFS) Program: Get your information security education paid for, and then come work for the U.S. government.
"It's one of the most generous scholarships I've ever seen," says Victor Piotrowski, Lead Program Director of SFS for the...
OK, back home and back in the office fulltime after a couple of weeks on the road to California for the RSA Conference and a bit of R&R. Some observations as I clear my desk ...
The CISSP has become almost ubiquitous among information security professionals. The same can be said for many industry- and technology-specific certifications.
So, what is it - beyond certifications -- that really jumps out from a resume and impresses a prospective employer?
We asked several hiring managers for...
Observations from day one of the RSA Conference.
Edgar Allan Poe might be the conference theme, but the topic everybody is talking about? Government.
From financial regulatory reform and compliance to the Obama Administration on cybersecurity, attendees and sponsors alike all are talking about the convergence of...
To this point, information security professionals have been generalists. Going forward, they'll have to be specialists. At least this is the opinion of John Rossi, professor of systems management/information assurance.
In an exclusive interview on the future of the information security profession, Rossi...
OK, so it's April 15, and everyone's mind turns to taxes and filing returns.
Me? I'm thinking of the pace of failed banking institutions we've seen so far this year - and wondering just how much we're taxing the FDIC's insurance fund.
From the Heartland data breach to the new Massachusetts data protection law, privacy is the hot topic in business and government.
In an exclusive interview, Peter Kosmala, assistant director of the International Association of Privacy Professionals (IAPP), discusses:
The top privacy topics in business and...
It's a simple proposition for successful applicants to the Scholarship for Service (SFS) Program: Get your information security education paid for, and then come work for the U.S. government.
"It's one of the most generous scholarships I've ever seen," says Victor Piotrowski, Lead Program Director of SFS for the...
It is an age old question: Who really is in charge of security? A look back into history, one can see the origination of the word "password" and how it came from the guard at the gate of a city or castle, who upon approached, would say "Halt, who goes there?"
From the Heartland data breach to the new Massachusetts data protection law, privacy is the hot topic in business and government.
In an exclusive interview, Peter Kosmala, assistant director of the International Association of Privacy Professionals (IAPP), discusses:
The top privacy topics in business and...
The National Security Agency (NSA), through the National INFOSEC Education and Training Program (NIETP), identifies 95 universities that conform to its standard for acceptable programs in information security today. Criteria for that determination are derived from recommendations of the National Security...
Angry about the Heartland data breach?
Anxious because you have an upcoming regulatory exam?
Frustrated by the effects of the global recession, and wondering when the heck we're going to climb out of it?
Identity and access management (IAM) deals with how users within an organization are given an identity - and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.