Evolution of the CISO The role for CISO has evolved in last two decades, In early year 2000 – organizations require security information officer to focus on regulatory compliance and interaction with external auditors and […]

Evolution of the CISO The role for CISO has evolved in last two decades, In early year 2000 – organizations require security information officer to focus on regulatory compliance and interaction with external auditors and […]
Cyberspace is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information and communication technology (ICT) devices and networks. Most of the governments have national cyber security strategies […]
Courtesy: 17 Mar 2010 | SearchSecurity.com Internet service providers have the ability to wipe nearly all malicious activity in their network without stepping on individual privacy and civil liberties, said Adam Rice, chief security officer […]