Security Experts:

long dotted


Kaspersky Lab announced a new initiative designed to support security startups and provide expertise and advice to foster much needed talent for the IT security industry. [Read More]
ENISA published a new report on the development of certification programs for ICS/SCADA cybersecurity professionals. [Read More]
A cyber security competition began Saturday in Tokyo, with organizers aiming to show off the skills of young Japanese hackers by testing them against international rivals. [Read More]
Two independent research groups have already managed to bypass the protection mechanisms provided by the latest version of Microsoft's Enhanced Mitigation Experience Toolkit (EMET). [Read More]
The European Union Agency for Network and Information Security (ENISA) is organizing today the biggest and most complex European cybersecurity exercise to date. [Read More]
In an effort to address the global cybersecurity workforce gap, the Information Systems Security Association (ISSA) has launched a professional development framework. [Read More]
A new report from (ISC)2 and the University of Phoenix sheds light on the challenges of closing the cyber-security workforce gap and offers recommendations to businesses, students and employers. [Read More]
The 2014 ICS Cyber Security Conference will address real world problems and discuss actual ICS cyber incidents, many of which have never been told before. Register by August 22 and save $300 on a full conference pass! [Read More]
Facebook awarded a $50,000 Internet Defense Prize to a pair of German researchers with a seemingly viable approach to detecting vulnerabilities in Web applications. [Read More]
FishNet Security has opened a new technology testing lab that allows partners and customers to vet technologies in a virtual IT environment using simulated network conditions and attack scenarios. [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Marc Solomon's picture
Open source is a valuable tool for defenders as they work to close these gaps and to gather greater intelligence about potential threats to make better decisions and take action.
Danelle Au's picture
The most effective CISOs today can’t just be experts in security. Organizations need a versatile security leader that speaks a new language-- one that is a blend of technology and business.
Mark Hatton's picture
The following is a list of questions that I recommend everyone ask security vendors as an initial filter.
Chris Hinkley's picture
Without the internal and external safeguards working in conjunction, your vulnerability will spike and your performance will suffer as a by-product -- two things you can’t afford to have happen.
Matthew Stern's picture
Successful conduct of military operations requires a unit’s clear understanding of the battle space it controls and its “area of operations”. This includes not only the terrain of the battlefield but also the capabilities, motives, and determination of the enemy they face.
Jon-Louis Heimerl's picture
In a perfect world, we would not stress this awareness for one month only. Awareness should be a constant, ongoing effort.
Chris Poulin's picture
Security should be a fascinating, dynamic, and creative pursuit. I say have fun, be creative, be criminal in your thoughts, but not your actions. The black hats who have you in their targets are having a blast.
Jon-Louis Heimerl's picture
External attacks are not our only worry. Most security nuts have been saying for years that our biggest threat is not external, but rather the "Internal Threat." I will take that a step further and say that one of the biggest threats that we face is the "oops".
Oliver Rochford's picture
Oliver makes the case for why the way that security awareness training is often approached is flawed. But if done in the right way, Security Awareness Training can provide a lot of value and benefit the security posture greatly.
Oliver Rochford's picture
In addition to being a renowned theoretical physicist, Einstein was also a wizard at writing security procedures and processes. Here is a short selection of quotes from Albert Einstein, and why they are worthwhile when thinking about security.