"Historically, there's been a dichotomy between network security on the one hand and investigative process on the other," FBI Director Robert Mueller says. "It has been a great divide between us but needn't be."
Education and training are two of the key priorities of information security professionals and organizations in 2010. And professional certifications are at the heart of that training.
What's new in information security certifications? In an exclusive interview at RSA Conference 2010, W. Hord Tipton, Executive...
What are the key banking/security topics on the minds of leaders of the nation's largest banks?
At the RSA Conference 2010, Paul Smocer of BITS and the Financial Services Roundtable discusses:
The Roundtable's information security priorities;
How regulatory reform may impact security organizations;
Under a proposed federal rule unveiled March 2, organizations designated to certify electronic health records software will assess the applications' security functionality but not require the use of specific security standards.
The three major regulations to support the electronic health records incentive program will be finalized by the end of spring, according to the team leader for the federal government's HITECH Act implementation effort.
The Obama administration posts a declassified summary of the government's Comprehensive National Cybersecurity Initiative, a highly secret Bush-era program aimed at securing the nation's critical IT security assets.
From RSA 2010: Interview with Bob Russo, GM of the PCI Security Standards Council
How will the Payment Card Industry Data Security Standard (PCI DSS) be amended, and when?
These are the key questions in payments security, and Bob Russo, GM of the PCI Security Standards Council, is prepared to start answering...