The answer seems obvious, especially in the context of IT security and information risk. Yet, is it, especially when developing codes and standards, as well as funding research and development initiatives that involve taxpayer money?
As social media continue to expand and evolve, organizations need to formalize a policy to address the risks. Expert Sherrie Madia details the must-haves that should be included in a policy.
Social media platforms are ever-evolving. But organizations' and individuals' use of social media has not evolved and may create new risks, says educator Sherrie Madia. How should we manage these risks?
Imagine sitting in a bar, as a stranger snaps a photo of you, and then uses that image to find out who you are using facial recognition technology. It's the type of practice that the staff of the U.S. Federal Trade Commission wants to discourage.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
The biggest social media concern for risk managers is the potential reputational impact to the organization, says risk expert David Bradford, who outlines mitigation steps.
As the overall number of "true exploits" have decreased, targeted ones - especially those initiated by criminals or nation states - are becoming harder to detect, say Rick Miller, director of IBM Managed Security Services.
Across the board, the job market in the U.S. is extremely competitive. Yet, fraud examiners are in demand -- and there are some tactics you can use to give yourself an edge when seeking a new job.
The PCI Security Standards Council has issued new guidelines on mobile payment acceptance security. What are the key recommendations? The council's Bob Russo and Troy Leach discuss the new guidance.
Visitors to the sites - applanet.net, appbucket.net and snappzmarket.com - will see a seizure banner that notifies them that the domain name has been seized by federal authorities.
The information security job market is rapidly growing, with positions needed in areas such as application security. But finding the talent is difficult, says Tom Silver of Dice.com. Find out why.
The benefits from employing social media as a way to connect with stakeholders outweigh the risks, says David Bradford, the editor of a new survey of risk managers. Still, he says, the risks must be adequately addressed.
Whether intentional or not, software features have the potential to leak sensitive information, corrupt data or reduce system availability. The National Institute of Standards and Technology's latest guidance aims to help organizations minimize vulnerabilities.
The number of IT security job postings is up 60 percent this year on technology job board Dice.com. What are the top five most in-demand security skills, and what do these jobs currently pay?
Blaming developers for application security problems is the wrong thing to do. Here are five reasons why application security development fails in the software development ecosystem of many companies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.