The US Cyber Challenge is looking for 10,000 young Americans with the skills to fill the ranks of cybersecurity practitioners, researchers and warriors.
Think twice the next time a contact tries to "friend" you on Facebook or "follows" you on Twitter. It may turn out to be an undercover fed looking to scrutinize your employment history or examine your personal references.
Building an effective security team boils down to two critical factors: the security leader who understands the mission and has the ability to find and manage the right people with the right skills to execute.
Breaches can stem from a number of lesser-known causes, ranging from information left on the hard drives on leased copy machines to documents left in filing cabinets donated for resale.
With risk management increasingly recognized as a core competency, the role of the chief information risk officer (CIRO) emerges as a new, strategic opportunity for security leaders.
In discussing Colorado's foray into cloud computing, Colorado Chief Information Security Officer Seth Kulakow discusses the demands the cloud presents governments and offers advice for IT security professionals on building their careers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.