On the topic of cyberspace, the U.S. Department of Homeland Security (DHS) doesn't mince words: "Our daily life, economic vitality, and national security depend on a stable, safe, and resilient ...
1. KEY RESPONSIBILITIES Job Summary – (Role Summary) Direct the development and management of the Global Information Security Assurance and Global Security Awareness programs for the company. Provide ...
In general, an information assurance analyst conducts ongoing vulnerability management activities to assess potential treats, coordinates and leads technology staff in identifying and remediating ...
Recently I was asked by a journalist for comments on careers in information assurance. Little of what I wrote fit into the article, so I’m publishing my remarks here. We will see increasing ...
The U.S. Senate Sergeant at Arms office is looking to hire a cybersecurity professional with “red team experience” who can “manage multi-million dollar annual budgets,” according to a job posting ...
Although often overshadowed by the far bigger Signals Intelligence Directorate, IAD’s mission of protecting sensitive information on government networks is more important than ever. Identity ...
TIKRIT, Iraq - Three simple keys, when struck in unison, open an entire world of information with a password. However, the user who has logged on isn't always the only one privileged to this wealth of ...
Air Force officers have until Aug. 31 to apply for special developmental education programs available for the 2010-2011 academic year. The four programs include the Olmsted Scholarship Program, White ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results