Blog Posts Tagged with "Education"
Paying Lip Service (Mostly) to User Education
October 24, 2012 Added by:Fergal Glynn
The connection between improved security and user education is so well-established as to be almost axiomatic. Better technology, coding practices and testing can only accomplish so much. So what’s being done about the dearth of solid user education?
Comments (13)
Metaphorically Speaking...
September 24, 2012 Added by:Tripwire Inc
Security people tend to be engineering oriented and suffer in the communication department. There’s an implied link that security might get broader adoption if security communication had more resonance with non-security people. Enter the popular use of the metaphor as meme...
Comments (0)
SOURCESeattle Write-Up
September 18, 2012 Added by:Robert M. Lee
As my perspective in infosec comes from my role as a Cyberspace Operations Officer in the Air Force, where most people say “infosec” I say “cyber” and try to speak on the broader domain impacts, deterrence, sharing threat intelligence, education, and the importance of working together...
Comments (0)
Chief Information Security Officer (CISO) Certified?
September 09, 2012 Added by:Jayson Wylie
The requirements involved with obtaining a certification past September 30th 2012 may not be beneficial for a CISO, andI do not know how applicants with this new certification will stand apart from those with graduate degrees in their understanding of security solutions...
Comments (8)
Security BSides is Coming Memphis
August 22, 2012 Added by:Security BSides
The goal of Security BSides is to expand the conversation beyond the traditional confines. BSides creates opportunities to both present and participate in an atmosphere that encourages collaboration. It is where conversations for the next-big-thing are happening. You don’t want to miss it...
Comments (0)
The BSides Las Vegas Innovation Challenge
August 16, 2012 Added by:Security BSides
It’s time to revive this tradition and bring it to the modern day security conference. From an open call to the world, twelve teams representing hackerspaces and maker groups will be selected to come to Las Vegas to compete in four categories in front of a panel of judges to demonstrate what they have accomplished...
Comments (1)
NATO Offers Cyber Defense Awareness Online Course
July 23, 2012 Added by:Infosec Island Admin
The NATO Cooperative Cyber Defence Centre of Excellence has developed an online Cyber Defence Awareness course that aims to enhance the general user’s awareness of cyber security risks and measures to mitigate those risks. The course may be accessed through the NATO Joint Advanced Distributed Learning portal...
Comments (0)
How to Become a Network Security Engineer
July 18, 2012 Added by:InfoSec Institute
While no two jobs are alike, there are some specific skills that will help network security engineers face the various challenges they will face day to day. What follows are just a handful of specific skills and duties required of network security engineers...
Comments (2)
Not So Tweet and Innocent: Social Networking Security Webinar
June 19, 2012 Added by:Kelly Colgan
In conjunction with the National PTA Convention, Tim Woda will present about the specific risks plaguing parents and ways to mitigate their concerns. Matt Cullina will unveil findings from a Harris Interactive survey of parents about their child’s social networking habits and what issues cause them the most fear...
Comments (0)
NSA's National Centers of Academic Excellence Announced
June 15, 2012 Added by:Headlines
Program graduates often develop into cyber experts who help to protect national-security information systems, commercial networks, and critical information infrastructure in both the private and public sectors – meeting the increasingly urgent needs of the U.S. government, industry, and academia...
Comments (0)
Security Field Entry Advice
June 08, 2012 Added by:Jayson Wylie
Government reports show that there is up to a fifty percent gap for information security needs to those able to fill them. This means that more and more people will attempt to enter into the information technology security field as the compensation for those who have security talent rises...
Comments (2)
Internet Security Alliance Hosts White House Cyber Jobs Event
June 06, 2012 Added by:Marjorie Morgan
"Most cyber breaches are not conducted by hackers from the outside but poorly trained or rogue insiders. The primary vulnerability in the cyber system is the people. Unless we find a way to spur the market to create a cyber secure workforce we risk unilaterally disarming both our economy and our national defense"...
Comments (0)
DHS Secretary Napolitano Announces Cyber Workforce Initiative
June 06, 2012 Added by:Headlines
“Today we face an increasing demand for the best and brightest in the cybersecurity field across industry, academia and government. DHS is committed to working with our partners... to develop the next generation of cyber professionals to protect against evolving cyber threats"...
Comments (0)
Hallway Con: The Real Reason to Go to Security Conferences
June 04, 2012 Added by:Rafal Los
No matter how much we push to a connected world via digital mediums - the human interaction, the discussion, and the ability to have a deep and meaningful problem-solving session outside the confines of the office is one of the most valuable things you can ever provide for your organization...
Comments (0)
Conferring about Security Conferences
May 30, 2012 Added by:Wendy Nather
There's a great discussion going on right now on Twitter about what's wrong with security conferences: Do we have too many? Are they focusing on the wrong things? Even if the hot topics are nominally the same, the perspectives and timbre of discussions will be very different...
Comments (1)
NSA Announces New Program for Careers in Cyber Ops
May 23, 2012 Added by:Headlines
Many of the nation's colleges and universities offer courses or promote projects in cybersecurity. NSA's new program differs in that it integrates the relevant academic disciplines, with a focus on technology and the techniques associated with specialized cyber operations...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization