Anecdotal evidence usually supports the data the Labor Department culls on IT security employment. Usually isn't always, and the 2013 stats reported by the Bureau of Labor Statistics are at odds with what is likely true.
The breach at Target stores that may have affected as many as 40 million credit and debit card account holders is a watershed moment that could greatly raise awareness of cybersecurity risks, says privacy attorney David Navetta.
The virtual silence on cybersecurity in President Obama's State of the Union address shouldn't be construed as a lack of commitment by the administration on information security, a White House spokeswoman says.
Amidst draft legislation and the fallout of large-scale breaches, now is both the best and worst of times for privacy, says Trevor Hughes of the IAPP. What are the best career opportunities for privacy pros?
Recognizing the leaders who play a critical role in shaping the way governments approach information security and privacy, GovInfoSecurity announces its fifth annual list of Influencers. See who made the list.
With information freely available about anyone on the Internet, ISACA's Robert Stroud says security professionals need to better monitor and control how personal information is being accessed and used.
Technology is the biggest challenge to ethics and compliance in organizations today, says Deloitte's Keith Darcy. "We have the capacity to do things before we ever consider the ethical consequences ..."
In a speech revealing new limits on the way intelligence agencies collect telephone metadata, President Obama also announced a comprehensive review of how government and business are confronting the challenges inherent in big data.
From new malware to the Target breach, cyber-attacks reached an all-time high in 2013, says Cisco's Annual Security Report. Cyberthreat expert Levi Gundert tells how organizations can regain the advantage in 2014.
CareersInfoSecurity's inaugural Top 10 Influencers list recognizes the leaders from business, education and government who are making groundbreaking efforts to have a great impact on information security careers in 2014.