Security roles News
February 06, 2015
A new report by HP shows most enterprise security operations centers fail to meet recommended maturity levels needed to detect and manage cybersecurity threats.
November 13, 2014
As their roles become increasingly integral to corporate success, IT security and compliance professionals want more input during business decisions.
October 15, 2014
Shon Harris, founder and CEO of Logical Security and recognized security certification training expert, died Oct. 8, 2014, after a long illness. SearchSecurity pays tribute to her contributions to the information security field.
February 25, 2014
The RSA conference convenes in San Francisco this week. But, asks Michele Chubirka, is the meeting really focusing on the critical issues?
Security roles Get Started
Bring yourself up to speed with our introductory content
Configuring role-based security within AWS lets you associate an IAM role with an instance. And that can improve security and help you better manage your instances. Continue Reading
A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access. Other elements of the CPO job include maintaining a comprehensive and current knowledge of privacy laws and communicating staff and customers alike about the company's privacy policies. Continue Reading
A successful career in information security requires an effective information security career plan Continue Reading
Evaluate Security roles Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
What exactly is a chief privacy officer, and what can one do to help your organization? Expert Mike O. Villegas explains how a CPO could help improve security. Continue Reading
The data threat landscape has forced companies to rethink hiring processes before a staff shortage negatively impacts security and compliance. Continue Reading
ISSA International Chair Stefano Zanero discusses how expanding threats force security pros to take a more proactive approach to data protection. Continue Reading
Manage Security roles
Learn to apply best practices and optimize your operations.
To adequately protect company data, businesses should start by promoting an organization-wide focus on security, said Secure Ideas CEO Kevin Johnson. Continue Reading
As Cisco rolls out a hardware-based alternative to software-defined networking approaches, what does it all mean for security? Continue Reading
Everyone has heard tales of compliance transformation using expensive, specialized GRC tools. But what about organizations on a budget? Can they automate aspects of compliance? Continue Reading
Problem Solve Security roles Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
By adopting the assumption-of-breach security model, CISOs and security pros can better protect critical data. Expert Ernie Hayden explains. Continue Reading
Do security certifications provide value and advance information security careers? Peter Rendall offers some surprising opinions from security execs. Continue Reading
Recruiter Peter Rendall sees information security career paths leading toward security specialist jobs; SIEM, DLP and analysis are especially hot. Continue Reading