2015년 3월 10일 화요일

Shortage of security pros worsens


ITworld Security Strategies
Google Plus LinkedIn Facebook Twitter


INSIDER
Akamai CSO takes a creative approach to finding security pros 
Andy Ellis, chief security officer at Akamai, doesn't try to hire perfect candidates. Here’s why. Read More 


RESOURCE COMPLIMENTS OF: Fortinet

Why You Need Sandboxing 
Learn how Advanced Persistent Attacks operate and why Sandboxing should be a key part of your security strategy. Get information on how the innovative Fortinet approach enables FortiSandbox to deliver 99% effective Breach Detection and deliver those results within one minute most of the time. Learn why NSS Labs “Recommends” FortiSandbox. Learn more now

WHITE PAPER: CDW

Complacent About Compliance 
The specter of compliance haunts everyone. It spans everything from governmental regulations, industry mandates, or service level agreements between partners. Companies must not only comply, they must also prove that they complied.View Now
Shortage of security pros worsens 
Companies are struggling to hire security pros, which means job options are plentiful for veteran candidates. Cisco estimates a million unfilled security jobs worldwide. Read More 

5 steps to incorporate threat intelligence into your security awareness program 
Incorporating threat intelligence can significantly improve the effectiveness of your Security Awareness program, if you do it correctly. Read More 

IoT's dark side: Hundreds of unsecured devices open to attack 
A self-described security "amateur" discovered hundreds of Internet-connected devices ranging from cameras to industrial control systems that were connected to the Internet without even basic password protection -- meaning they could be easily turned on and off or otherwise manipulated with a single click of a mouse. Read More 


WHITE PAPER: CDW

Take Security To Go 
As the line between work and personal devices blurs, the need for smarter mobile security is becoming crystal clear. We can help you gain visibility with the people,the products and the plan to enable flexibility without bending security. View Now
Cyberespionage arsenal could be tied to French intelligence agencies 
Five additional Trojan programs are related to the Babar malware that Canada's government believes is the work of French intelligence Read More 

Web browsers are also to blame for Lenovo's Superfish fiasco 
That no web browser prominently displays the name of the Certificate Authority vouching for a supposedly secure website makes man-in-the-middle attacks, such as the one by Superfish, possible. Techies can find this information, but it needs to be front and center so that non-techies can see it too. Read More 

This insane military laser weapon burned a hole through a truck a mile away 
It may not be the Terminator's phased plasma rifle in the 40-watt range, but a successful test of the Lockheed Martin ATHENA laser has proven it could clear out rush-hour traffic in record time. Read More 


INSIDER
5 common Wi-Fi attacks – and how to defend against them 
  In addition to using strong passwords, you need to prepare your network for these types of attacks. Here are some common vulnerabilities and how to protect against them. Read More 
 
BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

R programming beginner's guide
IT Resume Makeover: Emphasize your 'X factor'
4 open source monitoring tools that deserve a look
Free and cheap ways to learn about IT security
PowerShell for beginners: Scripts and loops
Six Ted talks that can change your career

What are you waiting for? Sign up today!
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

댓글 없음:

댓글 쓰기