Blog Posts Tagged with "Professional"


The Color of Intent

May 17, 2012 Added by:Jayson Wylie

If I said "hacker", everyone knows what goes along with that, and the audience may be impressed or annoyed depending on their fanfare or if they have been victimized. People still think hacker when they hear "pentester" and do not believe the in the existence of pure "white hats"...

Comments  (1)


Behave Yourselves and Establish a Good Internet Presence

May 16, 2012 Added by:Marc Quibell

The point is that hiring managers will look you up online, and your 'Internet Presence' will be scrutinized, and even more so because these are most likely technical people and know where to look. It's time to grow up and stop being that anonymous troll...

Comments  (0)


Infosec is Not a Religion

May 14, 2012 Added by:Infosec Island Admin

Infosec is not a religion. There are no Cardinals, there are no Bishops, there are only a bunch of people who want their opinion to be heard and listened to ad nauseum. It’s as simple as that, and if you start clothing it in the robes of ecclesiastical rhetoric, you FAIL...

Comments  (2)


Aren’t all Security Professionals Evangelists?

May 08, 2012 Added by:Andrew Weidenhamer

I often wonder is Evangelist the right title for some individuals. Considering that the main audience for a “Security Evangelist” is the security community, I’m not entirely sure how much conversion is actually happening as we all understand the importance of security...

Comments  (2)


Fear and Loathing in Infosec: The Black Mass

May 02, 2012 Added by:Infosec Island Admin

Gesticulating and making odd sounds, the hackers milled and jerked around like some strange species of black raptors. Babbling incoherently about arcane knowledge in the hopes of one upping the other hapless technoweens in the room....

Comments  (0)


ENISA Seeks Experts for Permanent Stakeholders Group

April 26, 2012 Added by:Infosec Island Admin

The PSG will be composed of 30 leading experts in network and information security, and should represent the information and communications industry, consumer and user organizations, as well as academic and research institutions. Submit applications by April 30, 2012...

Comments  (0)


On the Sustainability of Information Security

April 25, 2012 Added by:Rafal Los

The only way that information security can be a group of outliers is if we're considering ourselves within the entirety of the IT realm. While this would be great for my ego to think that myself and all my peers are just smarter than everyone else in IT, I know this to be false...

Comments  (0)


On the Value of Security Conferences

April 19, 2012 Added by:Rafal Los

What's interesting is the question of business value. Management sends employees to 'security conferences' to learn something and bring it back to the organization. But what value do the ever-increasing number of security conferences provide as stand-alone events?

Comments  (1)


Security Leaders Give Up

April 12, 2012 Added by:T.H. Enders

Breaking News: In uncanny synchronicity, CISOs, CSOs, auditors, and security consultants up and walked off their jobs today. It's hard to say what the repercussions will be. Pundits, analysts, and DHS are still trying to get a clear picture of the breadth of the problem...

Comments  (7)


Why Security is in Trouble

April 10, 2012 Added by:Rafal Los

Everything you do as an infosec leader needs to be aligned to your organization's mission statement and goals. Everything you do, every security-related decision you make, and every purchase and project you sign off on must first and foremost be aligned to the organization...

Comments  (1)


CISSP Reloaded Domain 5: Security Architecture and Models

April 09, 2012 Added by:Javvad Malik

This domain has a good title and there is probably a lot one can talk about. There are not enough competent security architects on the market. Sure you can get a lot of penetration testers of or risk and compliance type people. But good architects are hard to come by...

Comments  (0)


Positioning the Security Team Through Influence Part 1

April 06, 2012 Added by:Steven Fox, CISSP, QSA

The essential approach to enhancing the role of security professionals is to enhance their organizational influence. This article kicks off a series exploring basic influence styles, the associated pitfalls, and guidance for their proper application...

Comments  (0)


Shackleford: What’s RIGHT with Infosec

April 02, 2012 Added by:Dave Shackleford

We are coming to the realization that we will be breached. This is a huge, fundamental shift in mindset that’s actually healthy, not redolent of defeatism. We have too much surface area to cover, not enough people and technology, and dammit, defense is hard...

Comments  (2)


Security BSides Charleston 2012: Operating In-Security

March 16, 2012 Added by:Security BSides

A combination of students, professionals, geeks and tinkerers gathering to discuss Information Security, hear awesome talks and bring security into our everyday lives. Our mission is to provide an inclusive, inspiring and motivational environment to discuss and collaborate...

Comments  (0)


The Emperor's Advanced Persistent Clothing

March 12, 2012 Added by:J. Oquendo

When "experts" start believing their own hodge-podge of "truths", it spreads like a cancer and ends up in the ears of decision makers. When will security pros stop focusing on marketing in hopes of selling shares of the Brooklyn Bridge and focus on actually securing something?

Comments  (3)


The Security BSides Las Vegas Mentorship Program

March 08, 2012 Added by:Security BSides

We all know how hard it can be to find your voice, or translate data into talking points that won't lose your audience, so we're looking to pair first time conference speakers with a mentor who has a solid track record in public speaking to work with them from CFP to the podium...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »