2015년 3월 12일 목요일

Survey finds faith in Internet trust system fading fast

ITworld Security Strategies
Google Plus LinkedIn Facebook Twitter


INSIDER
Six entry-level cybersecurity job seeker failings 
When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that’s not as easy as it may seem.According to a poll last summer of 1,000 18–26 year olds conducted by Zogby Analytics and underwritten by Raytheon, about 40 percent of Millennials reported they would like to enter a career that makes the Internet safer, but roughly two-thirds of them said they aren’t sure exactly what the cybersecurity profession is, and 64 percent said that they did not have access to the classes necessary to build the skills required for a career in information security.That means, at least when it comes to the entry-level information security market, that there will be many job applicants continuing to enter the field with backgrounds that lack formal information security training. This echoes what we hear when we speak with CISOs and others who often hire security talent.To read this article in full or to leave a comment, please click here(Insider Story) Read More 


: Citrix Systems

Security Leadership Series: Security Strategies for Success 
Today’s highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. This exclusive CSO Magazine eBook shares best practices for leading meaningful security discussions, engaging users to protect business information, and meeting security-related compliance requirements. Learn more

RESOURCE COMPLIMENTS OF: IT Roadmap Denver

Gain Fresh perspectives & insights at IT Roadmap Denver 
Explore today’s biggest IT challenges and trends including: security & risk management, the digitization of the enterprise, devops, cloud management and more. Attend IT Roadmap Denver, April 7. Learn more - http://www.itroadmap.net/denver2015/NLP
Survey finds faith in Internet trust system fading fast 
  IT professionals are more reliant on public key encryption than ever before. They’re also more doubtful than ever before that the technology will keep their critical data and assets safe, according to a Ponemon survey of more than 2,000 IT pros. Read More 

10 young security companies to watch in 2015 
With IT spending on security on the increase, here are 10 security newcomers hoping to be worthy of corporate customers. Read More 

Why Israel could be the next cybersecurity world power 
  There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen. Read More 


INSIDER
R.E.S.P.E.C.T.: The way for CISOs to get and keep it 
While CISOs have one of the most important jobs in organizations - protecting its digital "jewels" - a survey finds they are not held in high regard by their executive peers. According to those in the field, the way to fix that is to combine technology expertise with real business savvy and good communication skills. Read More 

Security innovation: Where will it come from next? 
Innovative security products used to be easy to find, because we all knew where to look. Now, with the market evolution, there are many sources for highly disruptive advanced security products, and they might be found in a place you never thought to look! Read More 

Tech groups renew push for cloud, email privacy protections 
They want Congress to give greater protections from police searches to documents stored in the cloud for more than 180 days Read More 


WHITE PAPER: CDW

Complacent About Compliance 
The specter of compliance haunts everyone. It spans everything from governmental regulations, industry mandates, or service level agreements between partners. Companies must not only comply, they must also prove that they complied.View Now
First medical apps built with Apple's ResearchKit won't share data for commercial gain 
That's the assurance from the companies involved with the mobile framework's first five apps Read More 

Windows PCs remained vulnerable to Stuxnet-like LNK attacks after 2010 patch 
A Microsoft patch for an exploit used by the Stuxnet worm was incomplete, researchers found Read More 

Snowden docs show CIA's attempts to defeat Apple device security 
A secret CIA-sponsored conference reportedly hosted talks on stealing encryption keys from Apple devices and infecting them with malware Read More 

Researchers show why buying a used Nest may not be such a bright idea 
Researchers at security firm TrapX demonstrate how the Nest Learning Thermostat can be used as a beachhead by attackers to compromise an entire smart home. Read More 

Microsoft gets its FREAK on fast, patches encryption bug in Windows 
Microsoft today patched Windows to prevent possible FREAK attacks against users of Internet Explorer. Read More 

Kaspersky: ‘A very bad incident’ awaits critical infrastructure 
Cyber attacks against power grids, water supply systems, chemical plants and other critical infrastructure loom as a threat that could become harsh reality before slow-moving agencies act to secure them better, says the head of Kaspersky Lab.Read More 
 
BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

R programming beginner's guide
IT Resume Makeover: Emphasize your 'X factor'
4 open source monitoring tools that deserve a look
Free and cheap ways to learn about IT security
PowerShell for beginners: Scripts and loops
Six Ted talks that can change your career

What are you waiting for? Sign up today!
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

댓글 없음:

댓글 쓰기