Security Training

0dc5fdbc98f80f9aaf2b43b8bc795ea8

IT Skills and Salary Report 2011 from Global Knowledge

March 30, 2011 Added by:Global Knowledge

While the global economic recession of recent years has largely been replaced by a lethargic recovery, workers continue to be impacted by job loss, reduction in salary, or job change. IT professionals have felt the impact of these economic tremors along with the rest of their colleagues...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

IT Job Market Intel - Cutting Through the Fog

March 17, 2011 Added by:Mike Meikle

Once again, IT pros are going to have to develop significant business skills to set themselves apart from their mono-technical peers. While you may be able to capitalize on the Hot Skill Du Jour for a while, and we all have, it will continue to pay diminishing returns...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Does Your Company Have a Security Awareness Training Program?

March 10, 2011 Added by:Allan Pratt, MBA

Topics to discuss include good security practices such as making regular back-ups, encrypting sensitive data, turning off computers before leaving the office, carefully disposing of storage devices, and not installing illegal copies of software on company computers or devices...

Comments  (6)

Ebb72d4bfba370aecb29bc7519c9dac2

RSA 2011 Conference Notes from Anton Chuvakin

March 05, 2011 Added by:Anton Chuvakin

Most “analyst takeaways” from were about cloud and mobility. I heard a fun opinion on IT consumerization: if you deal with the security of employee devices by banning them, you will make your organization unattractive to the best employees – thus increasing, not reducing, your business risk...

Comments  (0)

B44a73900ca3197c2d8f148e303b3faa

Using NLP to Go Beyond “SMART” Goals

March 04, 2011 Added by:Brad Bemis

SMART goals are supposed to be Specific, Measurable, Achievable, Realistic, and Time-based. That seems pretty reasonable, so what’s missing? Neuro-Linguistic Programming introduces the concept of using a ‘well-formed’ outcome process – a process that makes your SMART goals even smarter...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security BSides, RSA: Things That Get Lost in the Shuffle

February 20, 2011 Added by:Rafal Los

Micro-focusing on the events and technology drivers that impact the state of software security is tough - especially when the hot topic of the day is cloud, cloud, cloud, "data exfiltration" - which we all know is code for WikiLeaks - and... oh, right, 'Cyber War'...

Comments  (2)

B44a73900ca3197c2d8f148e303b3faa

Competence-in-Depth: A Working Model

February 14, 2011 Added by:Brad Bemis

Information security is an incredibly diverse field. It is also a relatively new profession if you discount its long history in government and academia. As a developing professional discipline there are a number of challenges – we still have a lot of growing up and getting smart to do...

Comments  (0)

1789975b05c7c71e14278df690cabf26

Making Security Suck Less

December 15, 2010 Added by:Pete Herzog

And so it begins. Some important changes to the current security model necessary to actually improve security have been now made available to the public in the form of OSSTMM 3. Maybe this isn't "the" answer but it's a new road to take us off this rugged path and bring us much farther with much less troubles. If you've read it you'll know that taking on this new model will require big changes in h...

Comments  (21)

59d9b46aa00c70238bb89056cfeb96c0

Five Important Fraud Investigation Interview Tips

December 03, 2010 Added by:Thomas Fox

A successful investigation interview isn’t just a question and answer period. Asking good questions is just a small piece of a very big puzzle. To get the most out of your fraud investigation interviews, remember these 5 important steps...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

LISA 2010: Sysadmins Discuss Virtual Mentorship

November 23, 2010 Added by:Jamie Adams

There are system administrators focused on different operating systems, cluster specialists, network administrators, database administrators, system virtualization managers, and even security administrators. Our field also seems to have as many specialists as the medical community...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Government is Headhunting Cyber Warriors

November 20, 2010 Added by:Headlines

Even if there were a systemic change in the way of we prepare kids for technology careers, the US would still be a generation behind nations in Asia and Europe. The result could be the loss of our competitive edge in the marketplace, and result in the loss of our status a cyber superpower...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

A Review of Real World Security Professional Certification

November 18, 2010 Added by:J. Oquendo

The RWSP is the one exam that separates the Pros from the Joes. Unlike conventional exams, there is no method for anyone to cram information for the sake of passing this exam. Unlike the OSCP, OSCE, CPT and CEPT exams, you will not only be put to the test, you will be frustrated...

Comments  (2)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

What’s Another Certification Worth?

November 15, 2010 Added by:Global Knowledge

The answer is it depends, but with a bit of planning and a willingness to look outside your comfort zone, you can increase your earning potential. Data from our 2010 IT Salary and Skills Survey shows at least a 5% increase in salary for IT pros...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

CFP for RSA Conference 2011 Metricon 5.5 Event

November 07, 2010 Added by:Anton Chuvakin

Mini-MetriCon 5.5 is a forum for quantifiable approaches and results to problems afflicting information security today, with a bias towards specific approaches that demonstrate the value of security metrics with respect to a security-related goal...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

Will A Security Conference Help Your Company?

November 04, 2010 Added by:Lee Munson

Why send your IT staff to a conference? Security conferences are a place where both white and black hat hackers come out to show what they have discovered over the past year. The one thing that a hacker cares about more than money in this world is respect from his peers...

Comments  (0)

0f48ebb4a6ca02dbf5141affdbfa6898

Methodologies: Cleaning the Mental Gutters

October 25, 2010 Added by:Bill Wildprett, CISSP, CISA

My challenge and task is to apply this modality of critical thinking to the domains of information security, along with that of the OSSTMM. Like more physical exercise will clean the arterial plaque from your personal system, it’s important to floss your brain and defrag your mind...

Comments  (1)

Page « < 36 - 37 - 38 - 39 - 40 > »