There are more opportunities than ever for skilled information security professionals.
This is the belief of Gerald Masson, Director of Johns Hopkins University Information Security Institute, and in an exclusive interview he discusses:
Job prospects for information security professionals in the public and...
The National Cryptologic Museum (NCM) is the National Security Agency's principal gateway to the public, opening its doors in December 1993. Located adjacent to NSA Headquarters in Ft. George G. Meade, MD., the museum houses thousands of artifacts that collectively serve to sustain the history of the cryptologic...
"Cryptology is as old as mankind itself and dates from antiquity," says Patrick Weaden, curator at the National Cryptology Museum. People very early on realized that they needed to share certain information with certain people, so they developed devices to protect that information. Cryptology is the art and science of...
Steve Katz was the world's first CISO, and he has unique insight on the information security profession - how it's developed and where it's headed.
In an exclusive interview, Katz discusses:
How the information security role has evolved;
Which trends are changing the role;
The skillsets necessary for today's...
Hard times have taken a toll everywhere - even when it comes to internal audit practices at financial institutions.
Yet, in the wake of security breaches and questionable business practices at some financial institutions, federal regulators are cracking down on auditors. In an exclusive interview, Holly Kidder, a...
There are more opportunities than ever for skilled information security professionals.
This is the belief of Gerald Masson, Director of Johns Hopkins University Information Security Institute, and in an exclusive interview he discusses:
Job prospects for information security professionals in the public and...
It's a simple proposition for successful applicants to the Scholarship for Service (SFS) Program: Get your information security education paid for, and then come work for the U.S. government.
"It's one of the most generous scholarships I've ever seen," says Victor Piotrowski, Lead Program Director of SFS for the...
The CISSP has become almost ubiquitous among information security professionals. The same can be said for many industry- and technology-specific certifications.
So, what is it - beyond certifications -- that really jumps out from a resume and impresses a prospective employer?
We asked several hiring managers for...
To this point, information security professionals have been generalists. Going forward, they'll have to be specialists. At least this is the opinion of John Rossi, professor of systems management/information assurance.
In an exclusive interview on the future of the information security profession, Rossi...
From the Heartland data breach to the new Massachusetts data protection law, privacy is the hot topic in business and government.
In an exclusive interview, Peter Kosmala, assistant director of the International Association of Privacy Professionals (IAPP), discusses:
The top privacy topics in business and...
It's a simple proposition for successful applicants to the Scholarship for Service (SFS) Program: Get your information security education paid for, and then come work for the U.S. government.
"It's one of the most generous scholarships I've ever seen," says Victor Piotrowski, Lead Program Director of SFS for the...
From the Heartland data breach to the new Massachusetts data protection law, privacy is the hot topic in business and government.
In an exclusive interview, Peter Kosmala, assistant director of the International Association of Privacy Professionals (IAPP), discusses:
The top privacy topics in business and...
The National Security Agency (NSA), through the National INFOSEC Education and Training Program (NIETP), identifies 95 universities that conform to its standard for acceptable programs in information security today. Criteria for that determination are derived from recommendations of the National Security...
Identity and access management (IAM) deals with how users within an organization are given an identity - and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the...
The down economy pressures organizations to reduce operational expenses and discard many capital-intensive IT and security projects. What gets left behind often is a skeletal staff dealing with very basic day-to-day IT functions, with no time or resources to dedicate toward compliance, audit and core security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.