News

As the security threat landscape evolves, so do the roles that security professionals play. Chief security officers (CSOs) and chief information security officers (CISOs) are seeing the scope of their ...
A good information security architect straddles the business and technical worlds. Writing a solid, clear job description ensures that both sides understand the role. Whatever the role, good ...
Information security analysts are responsible for protecting information in an organization’s computer systems from data breaches and cyberattacks. Since lots of sensitive data is stored ...
Hackers are becoming increasingly creative in how they attempt to infiltrate an organization’s computer networks and systems. Luckily, information security analysts ensure that the most up-to-date ...
Hacktivism, spear-phishing, social engineering, advanced persistent threats (APT) and "run-of-the-mill" viruses and trolls all fall under the domain of information security analysts, who perform the ...
When reviewing job growth and salary information, it’s important to remember that actual numbers can vary due to many different factors—like years of experience in the role, industry of employment, ...
Responsibilities include participating in information technology risk assessments, IT audits, Sarbanes-Oxley compliance assessments, and IT consulting engagements. Responsibilities include ...
Hackers are becoming increasingly creative in how they attempt to infiltrate an organization’s computer networks and systems. Luckily, information security analysts ensure that the most up-to-date ...