When it comes to business continuity and disaster recovery planning, it isn't the cause of the disaster that's the concern - it's the potentially devastating effects.
The level of application security threats is rising, but the level of response is not. "That's a serious disconnect," says Jeff Williams, chair of the OWASP Foundation.
To help fight fraud, computer scientists from the National Institute of Standards and Technology offer some insight on how to protect commercial and consumer computers from keylogger infection.
With baby boomers reaching the retirement stage, and the first throngs of Gen Y entering the information security workplace, the profession is evolving - and gaining new definition.
When it comes to business continuity and disaster recovery planning, it isn't the cause of the disaster that's the concern - it's the potentially devastating effects.
Organizations today approach social media one of three ways: They embrace it, ignore it or are immobilized by it. The key to success is to manage the transition.
Defense contractors need hands-on candidates who can understand the technical and business issues within the government. Problem is: The demand for these candidates is clearly ahead of the current supply.
For most organizations, the biggest barrier to cloud computing is fear - "Will my data be secure?" It's time to tackle that fear head-on, says Jeff Reich, director of the Institute of Cybersecurity at the University of Texas, San Antonio.
Responding to market demand is ISACA, the non-profit security organization, which launched the Certified in Risk and Information Systems Control certification for IT risk professionals early this year.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.