Defense contractors need hands-on candidates who can understand the technical and business issues within the government. Problem is: The demand for these candidates is clearly ahead of the current supply.
For most organizations, the biggest barrier to cloud computing is fear - "Will my data be secure?" It's time to tackle that fear head-on, says Jeff Reich, director of the Institute of Cybersecurity at the University of Texas, San Antonio.
Responding to market demand is ISACA, the non-profit security organization, which launched the Certified in Risk and Information Systems Control certification for IT risk professionals early this year.
In an exclusive interview on careers in information security, Northcutt shares insights on opportunities and gaps he sees in our professional training system.
We frequently receive career-related questions from our readers, and when appropriate we take these queries to our own advisory board members for answers.
Lessons learned from the competitions should help the government and business develop programs to identify, train and recruit cybersecurity specialists, U.S. Cyber Challenge Director Karen Evans says.
Debbie Christofferson has worked in IT and information security for many years. And if there's anything she's learned about risk management, it's this: It's all about risk. "All of your decisions about information security should be based on risk to the organization."
The recent sentencing of a Chicago area physician for stealing about $13 million from Medicare and other insurers serves as an important reminder of the need for medical record access controls.
Mini-documentary takes you inside the U.S. Cyber Challenge security treasure hunt, where competitors hack deep into a target information system to capture flags in a contest that combines skills and wit.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.