As the information security industry becomes more coveted, Wendy M. Grossman takes a look at the university courses available to aspiring and competing infosec professionals on both sides of the Atlantic
As the information security industry becomes more coveted, Wendy M. Grossman takes a look at the university courses available to aspiring and competing infosec professionals on both sides of the Atlantic
Does your organization follow a recipe, or simply ‘eye-up’ the ingredients to your compliance tick boxes? Fred Donovan taste-tests what is often viewed as the unsavory side of the information security profession
How many traffic policemen never exceed the speed limit when off duty? How many vicars don't swear? And how many IT security professionals practice what they preach? No, seriously, do you eat your own dog food? That's the question Davey Winder has been asking of infosec professionals in an attempt to determine just how secure security experts really are away from the office
Whether intentional or unintentional, insider threats take many forms. The (ISC)2 US Government Advisory Board Executive Writers Bureau examines this dichotomy and how it is being affected by both regulatory considerations, and the rapidly changing technology landscape
Hackers exist almost anywhere there is an internet connection, yet the Chinese government continues to downplay their existence at home. Drew Amorosi takes a journey of enlightenment and seeks the truth
With changes to the US healthcare system already underway – albeit at a snail's pace – now is the perfect time to examine how the regulatory and compliance landscape may change with it. Esther Shein surveys the sector and seeks the proper prescription
Within only a minute of sitting down with Hord Tipton, executive director of (ISC)2, our own Eleanor Dallaway knew that the hour she had booked with him would not be adequate. You see, it's impossible to capture the true essence of a man with a career that many can only dream of in 60 minutes. While they may have been short for time, Tipton, however, certainly wasn't short on stories
In the wake of the tabloid cellphone hacking scandal, have operators really closed all the loopholes that let snoopers intercept our communications? Jim Mortleman investigates