Ten years ago, the National Security Agency (NSA) started up the Centers of Academic Excellence program to encourage stronger information assurance programs at colleges and universities. Initially, there were 7 designated CAE schools.
Today, the ranks have swollen to over 100 CAE-designated schools, and information...
This past Independence Day weekend, hackers targeted government and business websites in the United States and South Korea, causing confusion for network managers to differentiate between legitimate and illegitimate web traffic.
Security related incidents such as these have become not only more numerous and...
Ten years ago, the National Security Agency (NSA) started up the Centers of Academic Excellence program to encourage stronger information assurance programs at colleges and universities. Initially, there were 7 designated CAE schools.
Today, the ranks have swollen to over 100 CAE-designated schools, and information...
With the heightened focus on cybersecurity - and increased incidents of insider crimes - the digital forensics practice has also gained a higher profile in both the private and public sectors.
Keith Barger, a forensics veteran, currently serves as a director in KPMG's forensics practice in Houston, TX. In an...
With the heightened focus on cybersecurity - and increased incidents of insider crimes - the digital forensics practice has also gained a higher profile in both the private and public sectors.
Keith Barger, a forensics veteran, currently serves as a director in KPMG's forensics practice in Houston, TX. In an...
Information security - it's now a major national priority, and it's also the subject of a new Master's of Science program at East Stroudsburg University. This unique, online graduate program debuts on Aug. 31, and in an exclusive interview ESU professor N. Paul Schembari discusses:
The program's unique...
You've spent years in information security, toiling your way to the top - to the CISO role. What's next? What are your career options, and how should you prepare for exploring them?
Jennifer Bayuk is the former CISO at Bear Stearns & Co. She became an independent consultant after the company was acquired by...
The International Information Systems Security Certification Consortium (ISC2) has recently launched an online information security course, the Live Online Official ISC2 Certified Information Systems Security Professional Common Body of Knowledge Review Seminar.
Facebook, Linkedin, Twitter.com. These are just a few of the most popular social networking websites that are used extensively to find, meet and greet new people through a vast array of advanced web tools.
Social networking sites allow individuals and organizations to build communities. But just as social...
Steve Katz was the world's first CISO, and he has unique insight on the information security profession - how it's developed and where it's headed.
In an exclusive interview, Katz discusses:
How the information security role has evolved;
Which trends are changing the role;
The skillsets necessary for today's...
There are more opportunities than ever for skilled information security professionals.
This is the belief of Gerald Masson, Director of Johns Hopkins University Information Security Institute, and in an exclusive interview he discusses:
Job prospects for information security professionals in the public and...
The National Cryptologic Museum (NCM) is the National Security Agency's principal gateway to the public, opening its doors in December 1993. Located adjacent to NSA Headquarters in Ft. George G. Meade, MD., the museum houses thousands of artifacts that collectively serve to sustain the history of the cryptologic...
From the Heartland data breach to the new Massachusetts data protection law, privacy is the hot topic in business and government.
In an exclusive interview, Peter Kosmala, assistant director of the International Association of Privacy Professionals (IAPP), discusses:
The top privacy topics in business and...
"Jobless recovery." That's one term used by observers to describe today's economy. It means that the economy is slowly improving, but without the corresponding growth in hiring and new job creation.
Because of the economic conditions, risks to organizations - from the inside and out - are at a critical high. Risk managers at public and private organizations are forced to make careful decisions on how to invest scarce resources.
In an exclusive interview, Joe Restoule, President of the Risk and Insurance...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.