Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
At this year’s Governing Outlook in the States & Localities conference, a panel of chief information security officers (CISOs) from state and local governments addressed the topic: “CYBER SECURITY: One of the Nation’s Most Serious Challenges.” Participants provided insigh ...
0
comments
For several sessions in a row, federal cybersecurity legislation has been stalled while a squadron of lobbyists debate whether mandated compliance with federal standards will help or hinder IT security efforts in the private sector. The Administration is concerned that voluntary compliance will not ...
0
comments
By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB)   The title of a recent InformationWeek article, “Skills Shortage? Quit Whining” caught our attention. In the article, the author highlights data from a recent Deloitte Consulting survey, which report ...
0
comments
By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB) At a recent GOVERNING Conference in DC, state and local jurisdictions discussed the recent collapse of agency information technology (IT) staffs in an effort to save scarce financial resources. Among the reported casu ...
0
comments
  By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB)   In a recent article, "Infosec Joblessness Remains Steady, at 0%", Govinfosecurity.com editor, Eric Chabrow, discussed the startling fact that employment in the information security analyst car ...
0
comments
While the Federal Government shutdown was averted thanks to some last-minute political gerrymandering and concessions by both sides of the aisle, it’s quite instructive to reflect on the implications of shutdown on the federal cybersecurity workforce, including contracts and contractors. More ...
Showing 1 - 6 of 6 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×