Intrusion detection is challenging for most organizations, and hackers' ever-increasing skill to evade monitoring tools only compounds the problem. But Zions Bank's Michael Fowkes says big data can help.
Organizations typically secure data where it resides and is transmitted. Data-centric security strategies focus on securing the data itself. Mark Bower of Voltage Security explains.
Managing advanced persistent threats will be a priority throughout 2013, says RSA CISO Eddie Schwartz. How should organizations defend themselves against APTs and the year's other top security threats?
ENISA, the European Union cyber-agency, is out with its first-ever Threat Landscape report. What are the emerging threats and vulnerabilities, and how should organizations globally respond to them?
An evolving concept known as "intelligent security" involves using a combination of technologies to detect threats, helping security professionals become more proactive. Learn how pioneers are using the new approach.
CISOs' top three priorities for 2013 are emerging threats, technology trends and filling security gaps, says RSA CISO Eddie Schwartz. But what new strategies should leaders employ to tackle these challenges?
Post-Superstorm Sandy, as security pros prepare for disasters, they must consider the integrity and availability of data - an often overlooked business continuity element, says Alan Berman of DRI.
The Cloud Security Alliance has formed a big data working group to address privacy and security challenges among organizations. What are those challenges and how does the group aim to tackle them?
To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?
The great thing about fraud examination is that you can really play to your own strengths when choosing a career. The following six job roles are just a few of the career paths a fraud examiner might take.
Organizations using semantics and big data tools are creating a new position called data scientist to help uncover fraud and identify undetected vulnerabilities. Here are profiles of three leaders who have embraced this role.
A data scientist is a new breed of database professional who applies scientific analysis to large data sets to identify patterns and vulnerabilities. Here are five expert tips on how to qualify for the new role.
With the increasing amount of data being collected by organizations, the role of the data scientist has emerged to aid in analysis. What's unique about the role and what job functions does it entail?
How does the role of IT security professionals need to change to improve the security of their organizations? Steve Durbin of the Information Security Forum offers insights.
Challenged by sophisticated threats and the complexity and cost of security, global leaders wonder: "Is my organization going to be the next breach headline?" IBM's Latha Maripuri discusses global trends.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.