A new IBM study identifies three distinct types of information security leaders: Influencers, Protectors and Responders. Which type are you? IBM's Marc van Zadelhoff offers tips for more effective leadership.
The information security profession is a 'war for talent' today, says recruiter Kathy Lavinder. But to win the war requires specialized skill sets. Here are today's top requirements.
Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its Internet Security Threat Report, which reveals some surprising trends.
How can organizations ensure that their information security staff is mitigating the latest threats? And what truly defines an information security professional? Here are some of the key ingredients.
Symantec says Internet vulnerabilities are down, but don't get too comfortable. We can expect more attacks in 2012. Why are the same threats still posing so much concern?
Partisan bickering surrounding a bill aimed at protecting the nation's critical IT infrastructure is the likely reason the measure will not come up for a vote in the lower chamber this week, as representatives debate four other cybersecurity bills.
Creating a "culture of compliance" that emphasizes the importance of maintaining patient privacy requires far more than "management by committee," says change management specialist Jan Hillier.
One problem tracking IT security employment is the dearth of information. Even the most trustworthy organization in collecting employment data, the Bureau of Labor Statistics, furnishes infosec data it cautions aren't reliable.
Ignorance is not bliss. Two new studies, when viewed together, show that consumers' ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.
Where do time-strapped senior leaders go for education on cyber forensics and incident response? Carnegie Mellon University has a new option, and Dena Haritos Tsamitis explains its unique approach.
Should you accept a Facebook friend request from your boss? And if you don't accept the invitation, could that decision possibly hurt your career? I asked our advisers, who offer thoughtful insights.
"If they can do it against RSA, that makes most of the other companies vulnerable," says Army Gen. Keith Alexander, the military's Cyber Command commander and National Security Agency director.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.