Security Experts:

long dotted


Cisco has expanded its certification portfolio to include specialists in industrial networking and other fields.
Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.
The IEEE announced the launch of a new service designed to help the security industry respond more efficiently to the modern malware threat landscape.
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. This talk was presented at an official TED conference in March 2014.
The Defense Advanced Research Projects Agency (DARPA) revealed on Tuesday that the final competition for its automated security systems development challenge will take place in 2016 at DEF CON.
Microsoft Ventures, in collaboration with Israel-based venture capital firm Jerusalem Venture Partners (JVP), has launched a new program at the accelerator in Tel Aviv, Israel, dedicated to cybersecurity startups.
A large majority of the IT security community seems to agree that preventing Chinese researchers from attending security conferences in the United States is a bad idea.
Suits and Spooks New York will take place in New York City on June 20-21. We have a packed agenda of cutting-edge topics presented by speakers who have direct experience in combating security challenges on a daily basis.
Rapid7, a provider of security risk and penetration testing solutions, has launched certification programs for users of Nexpose and Metasploit Pro.
Healthcare organizations are still struggling with information sharing both internally and externally, participants in an industry-wide cyber-security exercise said.

FEATURES, INSIGHTS // Training & Certification

rss icon

Jon-Louis Heimerl's picture
In a perfect world, we would not stress this awareness for one month only. Awareness should be a constant, ongoing effort.
Chris Poulin's picture
Security should be a fascinating, dynamic, and creative pursuit. I say have fun, be creative, be criminal in your thoughts, but not your actions. The black hats who have you in their targets are having a blast.
Jon-Louis Heimerl's picture
External attacks are not our only worry. Most security nuts have been saying for years that our biggest threat is not external, but rather the "Internal Threat." I will take that a step further and say that one of the biggest threats that we face is the "oops".
Oliver Rochford's picture
Oliver makes the case for why the way that security awareness training is often approached is flawed. But if done in the right way, Security Awareness Training can provide a lot of value and benefit the security posture greatly.
Oliver Rochford's picture
In addition to being a renowned theoretical physicist, Einstein was also a wizard at writing security procedures and processes. Here is a short selection of quotes from Albert Einstein, and why they are worthwhile when thinking about security.
Vincent Liu's picture
In developing a Secure Development Lifecycle, you always start by performing an assessment of your current situation in order to establish a baseline of where you stand. Generally, there are two different types of application assessment tools on the market - static analysis and dynamic analysis tools. But what about the human element?
Idan Aharoni's picture
There are many security companies, individual researchers and certain circles in academia that hold a wealth of information on cybercrime activities that could be the difference between a bust and a cybercrime investigation that leads to a dead end. It’s not just about collaboration with other law enforcement agencies, but also about collaboration with the security industry.
Rod Rasmussen's picture
The dangers for a university or college network can lurk everywhere from e-mail to the Internet infrastructure itself. When a student’s computer on a college network is compromised, it’s not just the student who pays the price—legally, so does the institution.
Mandeep Khera's picture
The IT industry in general loves acronyms because it’s generally appealing to geeks, but the information security space might even be slightly more obsessed with acronyms.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!