Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
You've heard of Stephen Covey's "The Seven Habits of Highly Effective People?"
Well, information security leaders also must cultivate healthy habits to proactively manage their careers. Following are the 8 essential habits identified by successful security leaders:
Information security is the hot career option for professionals in 2010 and beyond.
This is the prediction of David Foote of Foote Partners, the FL-based consultancy that tracks IT skills and competencies. In a look ahead at 2010 and beyond, Foote discusses:
the security careers "bubble" and how it began;
The New Year comes with fresh perspectives on priorities to be addressed by information security leaders.
To get a sense of what's top-of-mind, we went to three information security leaders:
Emil G. D'Angelo, International President of ISACA. He is also the senior Vice President overseeing the corporate data...
The University of Dayton (UD) and the Advanced Technical Intelligence Center (ATIC) have partnered to address the shortage of skilled information security professionals within government and businesses.
Starting now, students in the masters in business administration program (MBA) at UD will have the option of...
Risk management and effective security controls are on every organization's agenda, and responding to this market demand is ISACA (formerly known as the International Information Systems Auditing and Control Standards), which introduces a new risk-related certification for IT risk professionals.
Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare.
The 10 most significant events regarding government cybersecurity in 2009 saw its genesis with the inauguration of a Blackberry-toting chief executive, the most tech-savvy president to occupy the Oval Office.
Interview with Jay Foley of the Identity Theft Resource Center
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010. This is the warning from Jay Foley, executive director of the Identity Theft Resource Center.
What's ahead for information security professionals in 2010?
Barbara Massa, VP of Global Talent Acquisition at McAfee, Inc. speaks to the results of the new Information Security Today Career Trends Survey, discussing:
How the results speak to the maturity of the information security profession;
What will be the hot information security jobs in 2010?
How will professionals grow their skills - and will their employers foot the bill?
What are the minimum academic and professional requirements for information security professionals and leaders today?
These are among the key questions answered in the...
What will be the hottest skills and competencies within information security in 2010?
Application security and biometrics are among the in-demand skills, according to the latest quarterly published list of the 2009 IT Skills Pay and Demand Trends Report by Foote Partners, LLC.
Information Security Media Group (ISMG) recently conducted its first annual Information Security Today Career Trends survey.
Based on survey results, here is a list of top 10 certifications most sought after by security professionals.
Business risks have grown in size and complexity in 2009. How, then, must risk management evolve to meet the challenges of 2010?
James Pajakowski, EVP of Global Risk Solutions with Protiviti, shares his insight on:
The risk management trends for 2010;
How information security professionals must meet the new...