Blog Posts Tagged with "Skill Set"


Infosec Recruiters Examine Security Career Trends

August 30, 2012 Added by:InfoSec Institute

"Penetration testers, the guys that come onto the sites—they’re highly in demand... In terms of technology, I think these guys see security in a different light than other people. They sort of can see it as a whole picture. Penetration testers are looking at it in a completely different light...."

Comments  (3)


Threat Intelligence: Plenty Out There, But Are You an Analyst?

August 27, 2012 Added by:Infosec Island Admin

As the complexity of attacks grow at a rate outstripping the pace of Moores Law, defenders have to take up a more nuanced approach to protecting their environments. Reliance on technical solutions alone is not tenable, you have to look at the creature behind the keyboard to get a better picture of the attack...

Comments  (1)


Infosec: Be All You Can Be

August 22, 2012 Added by:Randall Frietzsche

So what is an Infosec professional? Like the Samurai we're really warriors, we're soldiers in a battle of good vs. not-so-good. We craft our skills, we increase our knowledge, we strive to be better than those who might do our Enterprises harm, breach our castle walls and loot our treasures of data and services...

Comments  (7)


Breaking Into Security: Planet Earth Edition

August 14, 2012 Added by:Ian Tibble

As a pentest guru wannabe, you may possess extremely high levels of fuzzing, exploit coding, and reversing skills, but you will never get to use them and you will intimidate most interviewers. There are easier ways to break into systems. Security is insufficiently mature in most organizations to warrant pentesting...

Comments  (0)


DOD: Key to Cyber Defense is Highly Skilled People

July 31, 2012 Added by:Headlines

Cyber war is complicated and defending systems demands world-class engineers and technicians and the military must compete with other public agencies and the private sector in attracting these specialists. Having the right people in the right places with the right training is the best defense against any attack...

Comments  (1)


Moving To The Cloud: Internal Business Considerations

July 19, 2012 Added by:Ben Kepes

Corporate IT changes dramatically with a move to the cloud – no longer do people need to spend time racking and stacking servers, patching software and other low level tasks – in the long run organizations will not have email server administrators, desktop software support personnel or systems administrators...

Comments  (0)


The Network Intrusion Low Down

May 29, 2012 Added by:Jayson Wylie

Intrusion systems need a lot of care and attention. There are various abilities that help with administration, but if you have someone on staff whose skills and roles are as network administrator types, who like to be detectives and also have great attention to detail, then put them on the IPS...

Comments  (0)


Infosec and the Death of the Rabbi

May 17, 2012 Added by:Carter Schoenberg

What is more valuable, a SCADA security pro that understands a plant with such detail that his knowledge may never be rivaled, or a person who can also understand the organizations mission need and business drivers and can translate security into quantified risk measurements...

Comments  (2)


What Infosec Can Learn from Enron

May 09, 2012 Added by:Beau Woods

Auditors aren't the sole authoritative voice, and they can be fooled or coerced like anyone else. Too often internal and external auditors are trusted as the arbiters of right and wrong. This can fail an organization if executives don't understand the role auditors should play...

Comments  (0)


CISSP Reloaded Domain 7: Applications and Systems Development

May 08, 2012 Added by:Javvad Malik

Secure applications aren’t the result of evolution or chance conditions coming together. Secure applications are only created with a definite degree of intelligent design. You, as the security person are responsible for providing that intelligent design into the application...

Comments  (0)


On the Sustainability of Information Security

April 25, 2012 Added by:Rafal Los

The only way that information security can be a group of outliers is if we're considering ourselves within the entirety of the IT realm. While this would be great for my ego to think that myself and all my peers are just smarter than everyone else in IT, I know this to be false...

Comments  (0)


Is it Time to Reinvent the CISO?

March 13, 2012 Added by:Rafal Los

Is the CISO willing to take on more business-focused responsibilities, and look at information security from a less technical solution-oriented perspective - and if so is that sustainable? If you're looking for advice I have a little bit here for you...

Comments  (1)


Doing Biz with Hackers: Do Bad Guys Make the Best Good Guys?

March 06, 2012 Added by:Rafal Los

The significance of quality talent can't be overlooked - having a second-rate individual watching your virtual piggy-bank is as good as having none. It's not like there are thousands of ex-con hackers out there looking for work - but I suspect there are more than you think...

Comments  (3)


NICE Seeks Feedback on Cybersecurity Workforce Framework

December 05, 2011 Added by:Headlines

"Establishing and using a unified framework for cybersecurity work and workers is not merely practical but vital to the nation's cybersecurity. Much as other professions have defined their specialties, it is now time to forge a common set of definitions for the cybersecurity workforce..."

Comments  (1)


Russian Cyber Crime - Pride or Prejudice?

December 04, 2011 Added by:Danny Lieberman

“Why does every hacking and cyberscam story – real or fictional – seem to have a Russia connection? In part, it is prejudice and laziness. The stereotype of the Russian hacker has become such a common media trope that it gets recycled again and again..."

Comments  (0)


GAO Blasts Federal Management of Cyber Security Work Force

December 02, 2011 Added by:Headlines

"In an era of limited financial resources, better coordinated efforts to address both cybersecurity-specific and broader federal workforce challenges are crucial to cost-effectively ensuring that the government has the people it needs to continue to deal with evolving cyber threats..."

Comments  (0)

Page « < 1 - 2 > »