When it comes to protecting your organization and your customers from a data breach, what is considered "reasonable security?"
This question is at the center of several ongoing lawsuits, and how the courts answer it may be one of the biggest stories of 2010.
Shedding light on this hot topic is David Navetta,...
With the highest unemployment in more than 20 years and competition dense for open positions, the pressure is on for job seekers to have flawless interview skills - especially within information security.
C. Warren Axelrod is a veteran banking/security executive and thought-leader, and in an exclusive interview at the RSA Conference 2010 he discusses top security trends and threats, including:
Axelrod is currently executive advisor for the Financial...
Education and training are two of the key priorities of information security professionals and organizations in 2010. And professional certifications are at the heart of that training.
What's new in information security certifications? In an exclusive interview at RSA Conference 2010, W. Hord Tipton, Executive...
From RSA 2010: Interview with Bob Russo, GM of the PCI Security Standards Council
How will the Payment Card Industry Data Security Standard (PCI DSS) be amended, and when?
These are the key questions in payments security, and Bob Russo, GM of the PCI Security Standards Council, is prepared to start answering...
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
The Information Security Today Career Trends Survey identifies three distinct education trends re: information assurance:
Information security professionals seek advanced degrees;
Organizations are footing at least part of the bill for training;
Online education is an increasingly common and effective...
Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...