Security

Internet of Things Increases Need for Security Pros

Smart Home
The sheer number of “things” to be secured in the Internet of Things is expected to create a rash of jobs in cybersecurity over the next several years. “You’re going to have to secure the device or the sensor, you need to secure the data, and you’re going to have to secure that across an open network,” Intel’s head of business marketing, Stuart Dommett, told an IoT roundtable in May. “It really is a massive, massive change.” Click here to… continue…

Is This New Cyber Forensics Certification Worth the Investment?

(ISC)²
Continued pressure on cybersecurity systems is making professionals with security and forensic experience extremely attractive to employers. Not surprisingly, related certifications are gaining more attention, including one of the newer ones: the CCFP, or Certified Cyber Forensics Professional from the (ISC)². According to (ISC)² Executive Director W. Hord Tipton, the organization saw a need for a certification that was broader than those available for professionals working in and around law enforcement, intelligence, litigation, consulting and computer security. The CCFP’s target… continue…

The Next Big Threat to the Internet

Posted In Living in Tech
shutterstock_112158140
Here’s cause for a little Monday optimism: A majority of experts interviewed by the Pew Research Internet Project think the Internet will remain free in coming decades. Unlike most Pew surveys, which are randomized and meant to represent a broad swath of the American population, this latest research is described as a “canvassing,” with hundreds of technology experts invited to leave their opinions on the future of the Internet. To those 1,400 willing to submit to questioning, Pew opened with… continue…

Want to Help Lock Down Google’s New Chrome Extension?

Posted In Living in Tech
shutterstock_171929321
Google wants its developer community to pick through its latest Chrome extension, End-to-End, for potential vulnerabilities. End-to-End, currently in Alpha release, allows users to encrypt, decrypt, digitally sign and verify signed messages within the browser. It implements the OpenPGP standard, IETF RFC 4880. As part of its security process, Google has posted the source code on code.google.com, and it wants those with the skills to give it a thorough looking-over. Click here to see security jobs. “One of the reasons… continue…

Secret Service Wants Sarcasm Detection. That’ll Work Out.

Posted In Looking in Tech
Secret Srevice
The Secret Service is in the market for software capable of detecting sarcastic language online, according to the Washington Post. In a note posted on FBO.gov, the agency indicated that it wants a software tool that can perform real-time stream analysis, sentiment and trend analysis, audience and geographic segmentation, access to historical Twitter data and “ability to detect sarcasm and false positives,” among other attributes. Click here to see jobs involving sentiment analysis. “Our objective is to automate our social-media… continue…

3 Conundrums for the Internet of Things

Connected Home
As the Internet of Things expands its reach, the range of technologies being used to build and support it is expanding, as well. Languages including Java, Ruby and C are being employed, as are platforms like Microsoft’s Windows Embedded, Android, BlackBerry QNX and the relatively new Tizen. Cloud technologies are being put to use for connect devices, data and users. “You’ll see a whole bunch of technologies, not just programming languages,” Jnan Dash, senior advisor at MongoDB, told InfoWorld. “Data… continue…

State, Local Governments Resume Tech Hiring

Posted In Looking in Tech
Town Hall
State and local governments are picking up the pace of their IT hiring as the economy grows. Although smart officials are rethinking the level of staff they need on-site, a rash of retirements is creating a range of opportunities, says Alan R. Shark, executive director/chief executive officer of the Public Technology Institute at Rutgers University. Still, new dynamics are at play. “Some of the civil service laws are so archaic that classifications have no bearing on the market rate. IT… continue…

Banks Scramble to Find Big Data, Security Talent

Bank Vault
Banks are hot to hire IT professionals with Big Data skills, reports Bank Systems & Technology. “The big deal is Big Data. If you can harness it, you can benefit, so financial firms are funding those initiatives right now and hiring individuals with that background,” John Reed, senior executive director for Robert Half Technology, told the magazine. Especially needed are people who can help keep data secure, “as well as anyone who can assist them with their mobile banking efforts,”… continue…

Passwords Are the Worst

Posted In Working in Tech
Passwords
Technology advances by leaps and bounds with each passing year, until what seemed like a miracle in the recent past is boringly commonplace today. Despite that evolution, however, one piece of technology seems not only resistant to change, but downright un-killable: the humble password. We use passwords to access smartphones and tablets and PCs and ATMs and email and online shopping and social networks. We depend on them to keep us safe from all manner of hackers, casual thieves, snoopy… continue…

Chinese Government Bans Windows 8

Posted In Looking in Tech
Windows 8
The Chinese government has banned use of Windows 8, according to Reuters. Reuters reported that the official Xinhua news agency banned the operating system in the name of security and energy savings, although the latter’s bulletin didn’t explain how the ban would accomplish either of those aims. Microsoft declined to comment. Click here to find a Windows administration job. China is a heavy user of Windows XP, an aging operating system that Microsoft desperately wants its customer base to replace… continue…