Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The sixth annual Insomni'hack ethical hacking competition, organized by IT security firm SCRT, drew over 300 hackers who battled for hours to solve a range of fiendish computer security challenges.
The number of job postings for cyber-security positions grew twice as fast as the number for overall IT job postings in 2013, according to a jobs report.
Conference organizers said that its 23rd annual event drew a record of more than 28,500 attendees.
At the Cybertech Conference, Lockheed Martin and IBM both announced they would invest in CyberSpark R&D facilities, joining other cybersecurity leaders.
Embry-Riddle Aeronautical University's Prescott, Ariz., campus is launching what the University is calling its College of Security and Intelligence (CSI).
In its Global Threat Report, CrowdStrike identified many of the tactics, techniques, and procedures used by more than 50 different threat actor groups to craft and launch sophisticated attacks against major targets around the world.
Cisco announced a major revision of the CCNP Security Certification, and introduced a new Cybersecurity Specialist Certification, along with other security solutions training programs.
FireEye's acquisition of Mandiant and last month's acquisition of Norman Shark by Blue Coat Systems reflect the growing awareness among enterprises that they need sophisticated security technologies which go beyond antivirus and traditional perimeter-based defenses.
Industry-wide cyber attack exercises (CyberRX) will examine broad and segment-specific threats targeting information systems, medical devices and other essential technology resources of the healthcare industry.
As organizations search for solutions to protect their networks, data centers, and computer systems, an unexpected threat may be lurking under the surface—senior management.

FEATURES, INSIGHTS // Training & Certification

rss icon

Oliver Rochford's picture
Oliver makes the case for why the way that security awareness training is often approached is flawed. But if done in the right way, Security Awareness Training can provide a lot of value and benefit the security posture greatly.
Oliver Rochford's picture
In addition to being a renowned theoretical physicist, Einstein was also a wizard at writing security procedures and processes. Here is a short selection of quotes from Albert Einstein, and why they are worthwhile when thinking about security.
Vincent Liu's picture
In developing a Secure Development Lifecycle, you always start by performing an assessment of your current situation in order to establish a baseline of where you stand. Generally, there are two different types of application assessment tools on the market - static analysis and dynamic analysis tools. But what about the human element?
Idan Aharoni's picture
There are many security companies, individual researchers and certain circles in academia that hold a wealth of information on cybercrime activities that could be the difference between a bust and a cybercrime investigation that leads to a dead end. It’s not just about collaboration with other law enforcement agencies, but also about collaboration with the security industry.
Rod Rasmussen's picture
The dangers for a university or college network can lurk everywhere from e-mail to the Internet infrastructure itself. When a student’s computer on a college network is compromised, it’s not just the student who pays the price—legally, so does the institution.
Mandeep Khera's picture
The IT industry in general loves acronyms because it’s generally appealing to geeks, but the information security space might even be slightly more obsessed with acronyms.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!