A new model of security makes sense as nation states, criminals and hacktivists continue to take obscene advantage of the way things are, says Art Coviello, executive chairman of RSA. Falling short of his stirring call to arms to the ...
Salaries for most information security professionals are continuing to trend upward as demand increases, particularly for technical skills. According to the latest figures from recruitment specialist Acumin, the skills most in demand are ...
Tags: recruitment firm, technical skills, specific areas, e-discovery
The UK national Cyber Security Challenge has launched another competition to test the ability of amateur cyber defenders to protect a simulated government IT system. The competition is designed and run by the government's communications ...
Tags: defend, government, cyber attacks
Information security awareness needs to be company-wide, according to Julie Peeler, director of the (ISC)2 Foundation. "Organisations need to think beyond IT when planning IT security awareness training, and tackle it from the bottom up, ...
Tags: IT Security, Company-Wide, Julie Peeler, awareness training
Mobile device management (MDM) is not about security, according to Eric Green, senior vice-president of business development at security firm Mobile Active Defense Partners. "There is no security in MDM; its ability to secure a device is ...
Tags: MDM, BYOD, ISC, Eric Green, mobile security
Many big companies are failing to learn from information security incidents, according to Rob Kraus, director of research at malware analysis firm Solutionary. Few organisations are conducting post-incident reviews to see how and why the ...
Tags: information security, Cyber Attacks, 2012(ISC)2 Security Congress
When it comes to good government IT strategy, only collaboration will work in the long term, according to Hord Tipton, executive director of professional certification body (ISC)2. But after that, governments should stop trying to ...
Students at UK universities are among the recipients of the 2011 and 2012 Information Security Scholarships from professional certification organisation (ISC)². The (ISC)² Foundation Scholarship Program supports future ...
Tags: Information Security Scholarships, cyber security, (ISC)²
Big data and intelligence-driven security are to be the focus of the RSA Conference Europe 2012 in London next month. Three of the keynote sessions are related to these topics and they are represented in just about every time slot of the ...
Tags: Big data and intelligence-driven security, RSA Conference Europe 2012
There is zero unemployment in IT security,suggesting a huge shortage of skills in the profession,says Hord Tipton,executive director of professional certification body(ISC)2. But there needs to be a focus on training people to be ...
Tags: Skills shortage, unemployment in IT security, zero unemployment
We are entering a new age of cyber threats and need to change our approach to cyber defence, according to Roger Thompson, chief emerging threats researcher at ICSA Labs. "We need to stop relying on signature-based scanning systems," ...
Tags: cyber threats, cyber defence, signature-based scanning systems
Information security professional body (ISC)2 has announced a Young Professionals Group to attract young people to the field of information security. The initiative, part of (ISC)2's commitment to supporting newcomers to the profession, ...
Tags: Information security, cyber security, Cyber Security Strategy, (ISC)2
The "core values of Hong Kong" (freedom, democracy, human rights and rule of law) are the most debated topics in many election forums of the upcoming Legislative Council (LegCo) Election, which is scheduled on Sunday (September 9). The ...
Tags: Legco Election, Internet Freedom, Hong Kong, Government IT
The "core values of Hong Kong" (freedom, democracy, human rights and rule of law) are the most debated topics in many election forums of the upcoming Legislative Council (LegCo) Election, which is scheduled on Sunday (September 9). The ...
Tags: Legco Election, Internet Freedom, Hong Kong, Government IT
The night watchman and the IT security guy rarely work together even though their jobs,at the core,are similar:to protect the company.At many organizations,physical and information security remain separate entities by happenstance and by ...