Security

Articles, advice and resources.

Survey: People, Not Money, Are Key To Better Security

business-people-thumbnail
Security professionals believe one of the most effective ways to boost their systems’ safety has less to do with money and more to do with expanding their teams. Specifically, they’d rather have more experts than more technology. A survey by the IT security and compliance solutions provider Tripwire found that 44 percent wanted to up their skilled security staff, while only 32 percent preferred an increase in their budget. Another 24 percent wanted their board and/or key executives to buy… continue…

Cybersecurity Professionals Laud Job’s Challenge, Value

Cyber-Security-Thumbnail
California and Washington, D.C., continue to lure the lion’s share of cybersecurity professionals, with the majority working in government, manufacturing or defense-aerospace, according to a survey by the public-private partnership Semper Secure. In addition, such expertise is earning an average annual salary of $116,000, or approximately $55.77 an hour. Earlier this year, a report by Burning Glass International found that the demand for cybersecurity experts is growing at 3.5 times the pace of the overall IT job market. “For top… continue…

Two Security Training Resources Worth Your Time

computer-security-thumbnail
There are lots of expensive security conferences and training classes out there that can deliver certifications and skills. But if money’s tight, you can find free classes and lower-cost local conferences that might be worth investing some time in. Here are two such options that come highly recommended from those who have participated in them. First is the website OpenSecurityTraining. It offers dozens of lengthy and well-crafted tutorials on a wide range of topics including introductions to network forensics and… continue…

Jobs in Enterprise Cloud Governance

Cloud-Security-Thumbnail
By Myra Thomas As enterprises rally their IT departments around cloud governance, the demand for experienced architects with governance expertise is on the rise. “We’re certainly still in the very early stages of the conversation around cloud governance,” says Eric Marks, President and CEO of AgilePath, a management and consulting firm that handles cloud strategy, management and governance. But, he observes, the need for experts inside and outside the enterprise is already becoming clear. For IT departments, a shift to… continue…

Latest Check Point Study Highlights Dangers of BYOD

mobile-security
Check Point’s second annual mobile security survey found an increasing number of connected mobile devices, with BYOD growing quickly. Nearly half of the of 790 respondents — IT professionals in the U.S., Canada, UK, Germany and Japan — say they have five times the mobile devices connected to their networks compared to two years ago. Mobile devices are also now connected to more networks, 93 percent this year compared to 89 percent in last year’s survey. More than half of… continue…

NSA Revelations: Has The Planet Gone Mad?

World data
It was intriguing to see the tech community’s response to the NSA information-gathering revelations last week. High drama was the order of the day after The Guardian broke the story of a National Security Agency contractor releasing some strategic, classified PowerPoint slides, then hightailing into the shadows of Hong Kong. Dozens of NSA, spying and civil liberties stories dominated tech media outlet giants like YCombinator, ZDNet and GigaOM. As you’d expect, talk radio was abuzz with speculation and commentary. High-ranking,… continue…

The Beginning of the End of Security Theater

TSA Checkpoint
You often hear airport TSA checkpoints described as “security theater” because despite their imposing presence and processes, passengers still sneak contraband onto commercial flights. In IT, we see similar performances – and results. For us, security theater has manifested itself as the deployment of layers of technology like antivirus, Web filters, password policies, encryption, multi-factor authentication and on and on. When a breach and data loss does occur, IT does not hold itself liable because of all the measures that… continue…

Google Execs Predict a Future of Online Turmoil

The New Digital Age book cover
Despite the seismic changes wrought by the Internet over the past 20 years, there’s a sense out there that we’re really only getting started. Who better to piece together a book full of sweeping predictions about the Internet’s impact going forward than Eric Schmidt, the executive chairman and former CEO of Google, and Jared Cohen, director of Google Ideas and a fellow at the Council on Foreign Relations? In The New Digital Age: Reshaping the Future of People, Nations and… continue…

Ways AP Could Have Avoided Its Twitter Hack

AP Hack T
A single tweet with a phony bit of news sent the stock market into a brief dive Tuesday, pushing the Dow Jones Industrial Average down more than 140 points in the three minutes from 1:07 to 1:10 p.m. ET. When the “news” — that two bombs had exploded in the White House, injuring the president — was debunked, the market regained its footing.   Of course, phony information blasts out through Twitter all the time. The difference here is that… continue…

The Security Implications of Fake Twitter Followers

Twitter Logo
A recent New York Times story about the fake Twitter follower community got me thinking. The newspaper claims that this is a $1 million industry, with followers being purchased in bulk for about a penny a head. Why does Twitter tolerate this? Certainly, the company could easily fix this problem with some clever software engineering. Instead, they’re turning a blind eye. But on further reflection, it’s not something that’s easy to fix. I have a Twitter account that I set… continue…