| ITworld Security Strategies | |||||||||||
When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that’s not as easy as it may seem.According to a poll last summer of 1,000 18–26 year olds conducted by Zogby Analytics and underwritten by Raytheon, about 40 percent of Millennials reported they would like to enter a career that makes the Internet safer, but roughly two-thirds of them said they aren’t sure exactly what the cybersecurity profession is, and 64 percent said that they did not have access to the classes necessary to build the skills required for a career in information security.That means, at least when it comes to the entry-level information security market, that there will be many job applicants continuing to enter the field with backgrounds that lack formal information security training. This echoes what we hear when we speak with CISOs and others who often hire security talent.To read this article in full or to leave a comment, please click here(Insider Story) Read More : Citrix Systems Security Leadership Series: Security Strategies for Success Today’s highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. This exclusive CSO Magazine eBook shares best practices for leading meaningful security discussions, engaging users to protect business information, and meeting security-related compliance requirements. Learn more
In this Issue
RESOURCE COMPLIMENTS OF: IT Roadmap Denver Gain Fresh perspectives & insights at IT Roadmap Denver Explore today’s biggest IT challenges and trends including: security & risk management, the digitization of the enterprise, devops, cloud management and more. Attend IT Roadmap Denver, April 7. Learn more - http://www.itroadmap.net/ Survey finds faith in Internet trust system fading fast IT professionals are more reliant on public key encryption than ever before. They’re also more doubtful than ever before that the technology will keep their critical data and assets safe, according to a Ponemon survey of more than 2,000 IT pros. Read More 10 young security companies to watch in 2015 With IT spending on security on the increase, here are 10 security newcomers hoping to be worthy of corporate customers. Read More Why Israel could be the next cybersecurity world power There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen. Read More
While CISOs have one of the most important jobs in organizations - protecting its digital "jewels" - a survey finds they are not held in high regard by their executive peers. According to those in the field, the way to fix that is to combine technology expertise with real business savvy and good communication skills. Read More Security innovation: Where will it come from next? Innovative security products used to be easy to find, because we all knew where to look. Now, with the market evolution, there are many sources for highly disruptive advanced security products, and they might be found in a place you never thought to look! Read More Tech groups renew push for cloud, email privacy protections They want Congress to give greater protections from police searches to documents stored in the cloud for more than 180 days Read More WHITE PAPER: CDW Complacent About Compliance The specter of compliance haunts everyone. It spans everything from governmental regulations, industry mandates, or service level agreements between partners. Companies must not only comply, they must also prove that they complied.View Now First medical apps built with Apple's ResearchKit won't share data for commercial gain That's the assurance from the companies involved with the mobile framework's first five apps Read More Windows PCs remained vulnerable to Stuxnet-like LNK attacks after 2010 patch A Microsoft patch for an exploit used by the Stuxnet worm was incomplete, researchers found Read More Snowden docs show CIA's attempts to defeat Apple device security A secret CIA-sponsored conference reportedly hosted talks on stealing encryption keys from Apple devices and infecting them with malware Read More Researchers show why buying a used Nest may not be such a bright idea Researchers at security firm TrapX demonstrate how the Nest Learning Thermostat can be used as a beachhead by attackers to compromise an entire smart home. Read More Microsoft gets its FREAK on fast, patches encryption bug in Windows Microsoft today patched Windows to prevent possible FREAK attacks against users of Internet Explorer. Read More Kaspersky: ‘A very bad incident’ awaits critical infrastructure Cyber attacks against power grids, water supply systems, chemical plants and other critical infrastructure loom as a threat that could become harsh reality before slow-moving agencies act to secure them better, says the head of Kaspersky Lab.Read More | |||||||||||
BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.
- R programming beginner's guide - IT Resume Makeover: Emphasize your 'X factor' - 4 open source monitoring tools that deserve a look - Free and cheap ways to learn about IT security - PowerShell for beginners: Scripts and loops - Six Ted talks that can change your career What are you waiting for? Sign up today!
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
| |||||||||||
2015년 3월 12일 목요일
Survey finds faith in Internet trust system fading fast
피드 구독하기:
댓글 (Atom)
댓글 없음:
댓글 쓰기