It's one of the newest and most popular stops on the Washington, D.C. tour, and its artifacts of history leave clues for how information security professionals should approach their future.
The International Spy Museum has just celebrated its 7th year and its 5 millionth visitor, says Executive Director Peter...
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;
Potential career paths in cybersecurity.
Nadia D. Short...
The National Cryptologic Museum (NCM) is the National Security Agency's principal gateway to the public, opening its doors in December 1993. Located adjacent to NSA Headquarters in Ft. George G. Meade, MD., the museum houses thousands of artifacts that collectively serve to sustain the history of the cryptologic...
"Cryptology is as old as mankind itself and dates from antiquity," says Patrick Weaden, curator at the National Cryptology Museum. People very early on realized that they needed to share certain information with certain people, so they developed devices to protect that information. Cryptology is the art and science of...
Identity and access management (IAM) deals with how users within an organization are given an identity - and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the...
Key Questions to Ask Before You Select a VM Solution
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data.
Without proven, automated technology for precise...
Cybersecurity is a major priority of the Obama Administration, and at Carnegie Mellon University's Software Engineering Institute, it's a key component of the CERT Program's Survivability and Information Assurance (SIA) curriculum.
In an exclusive interview, Lawrence Rogers, chief architect of the SIA program,...
Have you asked yourself, "What threats (new and old) is our institution going to have deal with this year?"
What data security threats will be most prevalent for banking institutions?
The volume of attacks from international sources has and will continue to increase.
Data security breaches tied to theft...
The crime of deception is now even more deceptive.
Multi-channel fraud - schemes that are launched simultaneously via telephone, Internet, in person and via mail - is a growing concern for financial institutions. And the linked crimes aren't always easy to spot.
In this exclusive interview, security expert Diana...
The World Bank, an internationally-supported institution that provides loans to developing countries, is reported to have suffered a network intrusion that one insider labeled "an unprecedented crisis."
The breach, first reported by Fox News, alleges that servers in the Washington, D.C.-based bank's treasury unit...
In recent years, the hacking community has shifted its efforts toward a new frontier: the application layer. With most companies spending thousands, if not millions, of dollars securing the perimeter with network firewalls, intrusion prevent systems, and other devices, hackers have realized the lowest hanging fruit...
When most people hear "Social Engineering," they think of the criminal aspects of the term. But the practice also has professional applications for security practitioners who want to help test and improve organizations' security practices.
Social Engineering is the act of gaining unauthorized access to systems or...
The launch of the Payment Card Industry Data Security Standard (PCI DSS) has helped expose serious security shortcomings. The IBM System i (AS/400) presents its own unique set of challenges when it comes to PCI compliance. Read this white paper to learn the following:
How the standard relates to the AS/400
How to...
Understanding the trends and patterns of the past is the key to understanding the future, and security is no exception. The following security threat trends for 2008 have been assembled as a result of their frequency during security audits performed last year. These common and fundamental security issues typically...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.