Access "Good information security leaders must be good security recruiters"
This article is part of the December 2011 issue of An insider look at the Windows Vista security review
In contrast to an environment of high unemployment and difficult economic times, the information security industry has flourished. While companies have focused their efforts on productivity and profitability by eliminating jobs across standard business functions, information security’s visibility and importance has increased. A business climate consisting of well-publicized data breaches, lucrative criminal activity, socially driven hacktivism, government regulations and new technology development has created challenging and well-compensated career opportunities for information security professionals. The initial assumption would be these roles would be easy to fill due to their importance and level of compensation, however, that is not the case. In many cases, information security professionals who are capable of filling these positions are well compensated, well thought of, and are content and secure in their current positions. This makes them difficult to recruit. Therefore, if information security leaders want to succeed in their roles, it is essential ... Access >>>
Premium Content for Free.
SEC guidance clarifies cybersecurity disclosure requirements
by Marcia Savage
Companies need to factor security risks and incidents in their financial disclosures, agency says.
Enterprise digital rights management best practices
by Rich Mogull
EDRM brings users into security more than any other tool. Are you ready?
- SEC guidance clarifies cybersecurity disclosure requirements by Marcia Savage
Alternatives to passwords: Replacing the ubiquitous authenticator
by Ron Condon
As the relative security of passwords falters, are they destined for obscurity?
Chris Paget on Vista final software security review
by Chris Paget, Contributor
Researcher tells a firsthand account of her experience as a member of the final security review team for Windows Vista.
- Alternatives to passwords: Replacing the ubiquitous authenticator by Ron Condon
The ongoing debate over a federal breach notification law
by Marcia Savage
Lawmakers continue to wrangle over creation of a national data breach notification standard.
Good information security leaders must be good security recruiters
by Lee Kushner and Mike Murray
If you’re going to lure topnotch talent, refine your skills.
The need for cloud computing security standards
by Amy Larsen DeCarlo, Contributor
Cloud computing needs security standards and widely adopted security practices in order to become a viable choice for the enterprise.
- The ongoing debate over a federal breach notification law by Marcia Savage
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...