At a time when information security sees record growth - in every sector, there are more open positions than professionals to fill them - ISMG's new Job Board offers new resources to job seekers and employers alike.
Programs from Carnegie Mellon and the University of Maryland come at a time when organizations not only can't find enough IT security professionals to hire to meet their needs, but often lack the leadership to oversee IT security initiatives.
Aleksandr Suvorov, linked to Heartland Payment Systems hacker Albert Gonzalez, was sentenced for his role in schemes involving Dave & Buster's restaurants and more than 240,000 stolen credit card numbers.
Financial losses linked to ACH/wire fraud are down, but attacks are increasing. What contributes to that decline in losses, and where can banking institutions still improve their online fraud prevention?
Organizations using semantics and big data tools are creating a new position called data scientist to help uncover fraud and identify undetected vulnerabilities. Here are profiles of three leaders who have embraced this role.
The draft guidelines recommend developing system threat models, instituting a mobile-device security policy, implementing and testing a prototype of the mobile-device solution and securing a device before allowing user access.
A new guide has been released by the Information Commissioner's Office to help small and mid-sized businesses improve their IT security. Which threats should most concern them, and how can they use the guide?