Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber...
Interview with Jay Foley of the Identity Theft Resource
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010.
This is the warning from Jay Foley, executive director of the Identity Theft Resource Center. In an exclusive...
Interview with Wade Baker and Alex Hutton of Verizon Business
Earlier this year, Verizon Business unveiled its much-heralded 2009 Data Breach Investigations Report.
Now, the company has just released its 2009 Supplemental Data Breach Report, which reveals the 15 most common attacks against organizations.
What's ahead for information security professionals in 2010?
Barbara Massa, VP of Global Talent Acquisition at McAfee, Inc. speaks to the results of the new Information Security Today Career Trends Survey, discussing:
How the results speak to the maturity of the information security profession;
Business risks have grown in size and complexity in 2009. How, then, must risk management evolve to meet the challenges of 2010?
James Pajakowski, EVP of Global Risk Solutions with Protiviti, shares his insight on:
The risk management trends for 2010;
How information security professionals must meet the new...
In terms of information security, what is the state of auditing as we end 2009 - and what are the trends foreseen for 2010?
Warren Stippich Jr., Practice Leader of the Chicago Business Advisory Services Group of Grant Thornton LLP, discusses:
Where organizations are most vulnerable;
No question, the information security professional's role has evolved in recent years. How, then, has the need for ongoing professional education also changed? And what role must risk management play in today's security organization?
In an exclusive interview, Mark Lobel of PricewaterhouseCoopers and ISACA,...
We've experienced two waves of the H1N1 pandemic. What lessons have we learned?
Sue Kerr, President of Continuity First, a business continuity/disaster recovery consultancy, talks about how organizations have handled H1N1. She also discusses:
the state of BC/DR;
Challenges facing organizations today;
Interview with Kent Anderson of Encurve LLC
Cybersecurity, forensics, risk management -- what will be the core security skills needed in organizations in 2010?
In an exclusive interview, Kent Anderson, founder and managing director of Encurve LLC, as well as a member of ISACA's Security Management Committee,...
What have been the biggest privacy issues of 2009, and what emerging trends should you watch heading into 2010?
We posed these questions to J. Trevor Hughes, Executive Director of the International Association of Privacy Professionals (IAPP). In an exclusive interview, Hughes discusses:
The role of the IAPP;...
It's time for information security professionals to give back to their communities - to reach out and educate businesses, schools and citizens about cybersecurity and other relevant issues.
This is the message from John Rossi, professor of systems management/information assurance at National Defense...
Tough times require "softer" leaders.
This is the perspective of careers coach Heidi Kraft, who says that today's senior leaders need to focus more on emotional intelligence and other "soft" qualities to be able to better recruit and retain quality employees.
In an exclusive interview, Kraft discusses:
Allan Bachman has fought fraud since the early 1970s, and he's seen the crimes evolve in both sophistication and scale.
In an exclusive interview, Bachman, Education Manager for the Association of Certified Fraud Examiners (ACFE), discusses:
The evolution of fraud schemes;
The most common types of fraud seen...
Malware, Consumer Technology, Social Networks Head the List of Vulnerabilities
Know what scares security expert John Pescatore the most? The image of a remote employee sitting at a home office or public setting, plugging into an unsecured network, accessing critical business data via a personal laptop or...