The definition of reasonable security changes over time. And that's something the courts must consider when reviewing legal disputes over fraud liability.
If 2012 is the year of mobility - as remote computing drives organizations to figure out how to let employees gain access to critical systems from anywhere - 2013 is likely to be a repeat.
In the latest update, much was left unsaid about the Global Payments data breach. And if I were a Global customer or card-issuing entity, I'd have some serious follow-up questions.
How can organizations improve their e-discovery efforts? According to David Matthews, deputy CISO for the City of Seattle, it comes down to building up the necessary skills within your own team.
The number of IT security job postings is up 60 percent this year on technology job board Dice.com. What are the top five most in-demand security skills, and what do these jobs currently pay?
At a time when information security sees record growth - in every sector, there are more open positions than professionals to fill them - ISMG's new Job Board offers new resources to job seekers and employers alike.
Blaming developers for application security problems is the wrong thing to do. Here are five reasons why application security development fails in the software development ecosystem of many companies.
Programs from Carnegie Mellon and the University of Maryland come at a time when organizations not only can't find enough IT security professionals to hire to meet their needs, but often lack the leadership to oversee IT security initiatives.
From application security to the network, information security career options are exploding. What are the top jobs, and how must infosec pros distinguish themselves to prospective employers?
Which personality types are best suited for information security careers? Laurence Shatkin, author of "50 Best Jobs for Your Personality," shares tips for how to find the job that's right for you.
A successful organization in today's business world has most likely cultivated a "brand." Have you ever thought about creating your own brand to enhance your career?
"The reality is that, if you look across IT, IT people are very good at so many things; they're much better at it in a lot of cases than security people are," RSA CISO Eddie Schwartz says.
BITS is ramping up its work with federal regulators around pending legislation. What initiatives is the group spearheading, and how can banking institutions play an integral role in the process?
Information security isn't just the domain of those branded information security professionals but also requires the knowledge of nearly every other IT occupation as well as individuals in many non-technology jobs, too.
A data scientist is a new breed of database professional who applies scientific analysis to large data sets to identify patterns and vulnerabilities. Here are five expert tips on how to qualify for the new role.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.