Job hunting today is a bit like a game. It can be confusing and even a little scary. And if you haven't played in a while, you may be mystified by how the rules and the playground have changed.
Secure is a possible state of affairs at a certain point in time. But rugged describes staying ahead of the threat over time. Rugged organizations create secure code as a byproduct of their culture.
The great thing about fraud examination is that you can really play to your own strengths when choosing a career. The following six job roles are just a few of the career paths a fraud examiner might take.
Whether we are dependent on a supply chain or part of a supply chain, we are all vulnerable to disruptions beyond our control. What can we do to work towards achieving our supply chain resilience? Here are some tips.
Security personnel should be required to prove not only that they know how to do things right, but also that they know how to do the right thing. They must demonstrate commitment to ethical behavior.
Blaming developers for application security problems is the wrong thing to do. Here are five reasons why application security development fails in the software development ecosystem of many companies.
A successful organization in today's business world has most likely cultivated a "brand." Have you ever thought about creating your own brand to enhance your career?
Every new information security job search is likely to be fiercely competitive in today's market. Here is my game plan for potential candidates to help them stand out and get that next position.
It's the everyday attacks, not the Flames, that are most likely to put an organization's IT infrastructure in jeopardy. Here is advice for how organizations can staff up and improve cybersecurity.
After millions of well-meaning dollars spent on infosec initiatives and endless debates about legislation, any objective analysis would conclude that we're losing ground, just-retired CIA CISO Robert Bigman writes to the new cybersecurity coordinator.
The statistics revealed in the ACFE's new 2012 Report on Occupational Fraud and Abuse are all very real. Here are my insights on occupational fraud and steps leaders can take to detect these crimes.
Why do so many small and mid-sized enterprises continue to believe that business continuity planning is just for the big guys? And how do we go about convincing them otherwise? Here are some tips.
Application security is driving demand for highly skilled consultants. It's a challenging profession, and I've broken out five key skills that will distinguish you in the field.
How can organizations ensure that their information security staff is mitigating the latest threats? And what truly defines an information security professional? Here are some of the key ingredients.
Anti-fraud professionals often uncover misconduct in the course of our work. What types of ethical dilemmas must we navigate in our efforts to prevent fraud? Here are a few that come to mind.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.