Secure is a possible state of affairs at a certain point in time. But rugged describes staying ahead of the threat over time. Rugged organizations create secure code as a byproduct of their culture.
A shift to context-aware information security will drive the big data trend and aid in better defending against threats. Gartner analyst Neil MacDonald explains how.
Banks and the U.S. payments infrastructure are prime targets for international cyberattacks. And it's not just money hackers are after, says Bill Wansley of Booz Allen Hamilton. What else is at risk?
As the skills for IT security professionals evolve, Gartner's Tom Scholtz explains what key competencies IT security teams immediately need and how they should go about investing in them.
People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand.
"We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate...
When two organizations merge, their top security/privacy challenge doesn't necessarily involve technology. Sometimes it's culture, says Christopher Paidhrin of PeaceHealth Southwest Medical Center.
Information sharing has been trending upward, according to data from the monthly cybersecurity index. And while it's not surprising, it is "gratifying," says index co-publisher Dan Geer.
COBIT 5 for Information Security comes at a time when the IT threat landscape is changing drastically. ISACA's Robert Stroud explains how organizations can use the framework to mitigate the risks.
Organizations allocating security budgets often place their efforts into areas that have no impact on business processes. That's one takeaway CTO Dwayne Melancon sees when evaluating the state of risk management today.
Increasingly, security and risk issues have the attention of boards of directors. What are the keys to discussing these topics with the board? John South, CSO of Heartland Payment Systems, shares tips.
Google's $22.5 million settlement with the Federal Trade Commission is the largest fine ever imposed by the FTC. But the case sends a bigger message about privacy, says attorney Francoise Gilbert.
"Clearly, the market has not developed ... on its own the cybersecurity requirements," John Brennan says. "Of course, if it did, then we wouldn't have these intrusions and the billions of dollars of losses that companies are now writing off."
The great thing about fraud examination is that you can really play to your own strengths when choosing a career. The following six job roles are just a few of the career paths a fraud examiner might take.
Google will pay $22.5 million to settle FTC charges that it misrepresented its privacy promises to Apple Safari users. The fine is the largest penalty the FTC has ever obtained for violation of one of its orders.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.