Print Issue: May 02, 2011
The recent social engineering attack on RSA has dominated industry talk, with some dubbing coverage of the incident a media circus.
Three top executive security recruiters weigh in on what today’s information professional needs to do to shine in a volatile marketplace.
Security professionals are recognizing the need to possess operations knowledge that will help them translate security objectives into business enablement.
Some 73,000 people hold the CISSP certification. But in today’s competitive job marketplace, are they enough to separate oneself form the pack?
Multiple state agencies in New Jersey left confidential information on computers set to be sold at auction, and other security-related news and cybercriminal activity from around the world.
If you aren’t already trying to figure out your mobile device security strategy, you soon will be, says Vicky Ames, former information system security officer at a federal medical research agency.
Different fields of digital forensics place a range of requirements on the tools being used, but these tools assist in completing a focused task as optimally as possible, says Nicholas Logan.
This month, the focus is on analysis. We look at the network through the lens of the SIEM, and we look at digital incidents and cybercrime through digital forensics.
Skills in demand: A growing need for advanced threat analysts
Larry Clinton, CEO of the Internet Security Alliance, says he tries to bring industry and government together to figure out how to secure all the popular digital devices in use.
Next post in Features