In the wake of the Supreme Court ruling, security and privacy leaders need to forge ahead with initiatives that were left in limbo while the court weighed the constitutionality of the healthcare reform law.
Occupational fraud is quite possibly the largest form of fraud, says John Warren of the ACFE. So how can organizations spot the potential fraudsters and prevent their crimes? Warren shares insights.
Gartner's Tom Scholtz doesn't see a shortage of technically skilled IT security practitioners. But he perceives a dearth of infosec pros who truly understand how security links to an enterprise's business goals.
Owners of critical infrastructure might be shamed into providing the necessary security to safeguard their information assets. That's one takeaway of a compromise Senate bill proposed by Democrat Sheldon Whitehouse and Republican Jon Kyl.
LinkedIn contends it had on staff world-class security experts when nearly 6.5 million members' hashed passwords were pilfered, although the social media company has neither a chief information officer nor chief information security officer.
Howard Schmidt takes exception with aspects of our blog that addresses his position in the White House hierarchy and relationship with agencies' chief information security officers. Here's his response.
"We require people with very strong, foundational grounding who can solve hard problems that are highly technical in nature," says Sujeet Shenoi, professor at the University of Tulsa in Oklahoma.
It's the everyday attacks, not the Flames, that are most likely to put an organization's IT infrastructure in jeopardy. Here is advice for how organizations can staff up and improve cybersecurity.
LinkedIn, the social network that's investigating the pilfering of nearly 6.5 million of its members' passwords, has neither a chief information officer nor chief information security officer.
The statistics revealed in the ACFE's new 2012 Report on Occupational Fraud and Abuse are all very real. Here are my insights on occupational fraud and steps leaders can take to detect these crimes.
Do you have the right personality type to flourish in an IT security role? Laurence Shatkin, author of "50 Best Jobs for Your Personality," offers tips for finding the job that truly fits your type.
Factors driving up the index vary from month to monthly, but the clear takeaway of the survey of IT security practitioners is that they're getting more apprehensive about safeguarding IT.
The information security profession is a 'war for talent' today, says recruiter Kathy Lavinder. But to win the war requires specialized skill sets. Here are today's top requirements.
Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its Internet Security Threat Report, which reveals some surprising trends.
Creating a "culture of compliance" that emphasizes the importance of privacy requires far more than "management by committee," says change management specialist Jan Hillier.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.