This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I think there are four main trends that will play out in the field of informationsecurity in the next 20 years. 2021-2030) A Surge in Demand for InfoSec people will result in many more professionals being trained and placed within companies, likely using more of a trade/certification model than a 4-year university model.
Elaborating more on this, we have explained in this article basic PCI DSS firewall requirements, and the need for smallbusinesses to install firewalls. Ensure that the security policies and operational procedures for managing firewalls are documented, in use, and personnel responsible are aware of it.
Our schools are being disabled, our smallbusinesses are being pilfered, our cities are being taken offline, and now our hospitals are being attacked as well. I talk about the reasons here , but in short, we have long had a horrible state of security in our local governments, our smallbusinesses, our schools, and our hospitals.
Chris Hass, director of informationsecurity and research at Automox, discusses how to assign security responsibility, punishment for poor cyber-hygiene and IDing 'security champions' to help smallbusinesses.
Broadly speaking, there has been an increase in the amount of overall investment in the recruitment and retention of informationsecurity talent. As organisations work to improve their ability to manage information risk, the importance of having a Chief InformationSecurity Officer (CISO) is also being recognised.
“At least 30,000 organizations across the United States — including a significant number of smallbusinesses, towns, cities and local governments — have over the past few days been hacked by an unusually aggressive Chinese cyber espionage unit that’s focused on stealing email from victim organizations, multiple sources tell KrebsOnSecurity.”
Consulting for small organisations lately to design and implement their ISO/IEC 27001 InformationSecurity Management Systems, resourcing constraints often come to light, particularly the lack of informationsecurity expertise and knowledge in-house.
Josh Feinblum is the co-founder of Stavvy, a Boston-based fully integrated digital mortgage platform, where he leads product, engineering, people, and finance. He also serves as a venture partner at F-Prime Capital, where he evaluates and advises startups of all stages across multiple verticals.
Since 2007 the InfoSec industry has been talking about TheBigOne™—the event that would change cyber threats from annoyances to existential concerns. Even medium and large businesses struggle to handle this threat, and that’s with dedicated security staff to help them. They called it Cyber Pearl Harbor.
On Sunday I blogged about preparing four new 'topic-specific' informationsecurity policy templates for SecAware. A healthcare company could mention health-related risk examples where delays in furnishing critical information to the workers who need it could jeopardise treatments and critical care.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content