In the past, just writing "privacy pro" on a business card could get you into the field. "That's not the case today," says the IAPP's Trevor Hughes, who details today's challenges for privacy professionals.
A federal agency is offering a free online training program that provides useful insights on protecting information privacy. Learn how this clever training "game" works.
The growth in messaging technologies has fraudsters targeting new channels to attack organizations. Craig Spiezle of the Online Trust Alliance offers tips on how to improve messaging security.
E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.
At St. Dominic-Jackson Memorial Hospital in Mississippi, a proactive breach prevention strategy has dramatically reduced privacy violations involving nosy healthcare workers inappropriately accessing medical records.
As the skills for IT security professionals evolve, Gartner's Tom Scholtz explains what key competencies IT security teams immediately need and how they should go about investing in them.
People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand.
"We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate...
When two organizations merge, their top security/privacy challenge doesn't necessarily involve technology. Sometimes it's culture, says Christopher Paidhrin of PeaceHealth Southwest Medical Center.
"Clearly, the market has not developed ... on its own the cybersecurity requirements," John Brennan says. "Of course, if it did, then we wouldn't have these intrusions and the billions of dollars of losses that companies are now writing off."
The information security job market is rapidly growing, with positions needed in areas such as application security. But finding the talent is difficult, says Tom Silver of Dice.com. Find out why.
If 2012 is the year of mobility - as remote computing drives organizations to figure out how to let employees gain access to critical systems from anywhere - 2013 is likely to be a repeat.
In the latest update, much was left unsaid about the Global Payments data breach. And if I were a Global customer or card-issuing entity, I'd have some serious follow-up questions.
How can organizations improve their e-discovery efforts? According to David Matthews, deputy CISO for the City of Seattle, it comes down to building up the necessary skills within your own team.
The number of IT security job postings is up 60 percent this year on technology job board Dice.com. What are the top five most in-demand security skills, and what do these jobs currently pay?
At a time when information security sees record growth - in every sector, there are more open positions than professionals to fill them - ISMG's new Job Board offers new resources to job seekers and employers alike.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.