Blog Posts Tagged with "Professional"

0a8cae998f9c51e3b3c0ccbaddf521aa

Challenges for Software Security Professionals

December 02, 2011 Added by:Rafal Los

So what catches your attention? What conclusions can you draw here that may be insight into how we can improve the state of software security in the enterprise? My eye gets caught on "politics" and TOOLS in big bold letters... then UPHILL and APATHY. Dang, we're a cynical bunch aren't we...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

NICE Issues Cybersecurity Workforce Framework

November 09, 2011 Added by:Headlines

The framework organizes cybersecurity work into high-level categories ranging from the design, operation and maintenance of cybersecurity systems to incident response, information gathering and analysis. The document is meant to define professional requirements in cybersecurity...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

SecBiz -- Who will be Infosec's Pariah?

November 07, 2011 Added by:Ali-Reza Anghaie

Infosec has become overrun with FUD. We're on the verge of bottoming-out and reconstructing our collective industry souls. The next three years will be exciting times for our industry. And the first major breakthrough will be finding our pariahs...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Top Ten Information Security Industry All-Stars

November 04, 2011 Added by:Headlines

Messmer's list is comprised of those "who year after year demonstrate the specialized skills that make them worth listening to". Several recently gave presentations at Hacker Halted and at Black Hat, and Infosec Island was fortunate enough to have conducted video interviews with them...

Comments  (1)

8d46625dfeb915129e6126132db8c08f

Be An Information Security Green Beret

November 01, 2011 Added by:Chris Clymer

In Infosec, we have a lot of Rambos. We’re used to being looked to for answers, and we’re also used to being in the minority. There will always be more users, more IT staf, more “natives” who do not speak our language and who do not have a strong understanding of information security...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

IT Skill and Salary Trends 2011

October 16, 2011 Added by:Bill Gerneglia

The demand for certain IT skills come and go with the economy. Certain skills are always in demand and others to a lesser degree. As an IT worker are you earning what you are worth? As an IT manager are you paying too much or too little to your IT staff?

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

Plagiarism and the Security Professional part 2

September 19, 2011 Added by:Craig S Wright

Writers have taken Gregory D. Evans, “author” of "World’s No. 1 Hacker" book to task for stealing vast blocks of other people’s work. Yet these people remain. Despite their frauds in passing off a level of expertise they do not actually possess, people trust these security doppelgangers...

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

Internet Piracy, Plagiarism and the Security Professional

September 16, 2011 Added by:Craig S Wright

The issue is that some in the security industry leverage the works of others coupled with external promotion to seem more than they are. We all suffer for this, and in a field as critical as security the costs can be disproportionate to the damage an individual could seem to be able to create...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

Strutting and Fretting Upon the Security Stage: Intro

September 14, 2011 Added by:Infosec Island Admin

I have heard others lament the state of the “security industry” and have posted about my own adventures in the land of FUD and Security Theater as well as a side trip into the lands of denial. My goal with this series is to cover the players, the game, and the realities of the security business...

Comments  (4)

44fa7dab2a22dc03b6a1de4a35b7834a

Compensation Increases for CIOs and IT Workers in 2011

August 20, 2011 Added by:Bill Gerneglia

According to the first-half 2011 IT salary survey from Janco Associates, IT compensation has increased slightly. While overall employment remains lackluster by most organizations across all industries, there is comfort in the fact that more tech jobs are being added than are being cut...

Comments  (0)

Aecf1189abe745df32ec68f5864649a6

For Infosec Pros: How Firms Create Value

August 16, 2011 Added by:Nick Owen

My goal is to provide information security pros a basis for discussing risks with business pros. For information security pros, the goal should be to reduce the risks of cash flow streams so that the cost of capital for projects are less than the firms weighted-average cost-of-capital...

Comments  (0)

E973b16363b3de77b360563237df7e32

Information Systems Security as a Profession

August 04, 2011 Added by:Bozidar Spirovski

If you’re considering a career in IS security, you’ll find job openings in a variety of related areas. Security specialists may be found in each of the following BLS occupational groups, and often enjoy salaries in excess of $100,000 per year...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Too Many Tools, Not Enough Glue?

July 26, 2011 Added by:Rafal Los

The difficult part with handling information security seems to be memory, applicability, and planning. Can I recall where that tool is and how it works? Do I have enough actionable intelligence right now? Did I leave enough breadcrumbs to prepare me for this need? Is there a plan?

Comments  (0)

B8b580348b4e717042d0e394ee072001

My Canons on (ISC)² Ethics - Such as They Are

July 25, 2011 Added by:security curmudgeon

In the email thread between ISC2 general counsel Dorsey Morrow and CISSP holder Boris Sverdlik, one of the replies from Morrow was unbelievable. Not only is the email negligent and libelous, it demonstrates unprofessional behavior and a serious lack of knowledge...

Comments  (17)

44a2e0804995faf8d2e3b084a1e2db1d

PFC Parts' Delectable Cyber Security Shopping List

July 19, 2011 Added by:Don Eijndhoven

A study done by the CSIS speaks of a human capital crisis in Cyber Security and may offer some insights that can also be used outside of the US. CSIS mentions that there are a variety of people and skills needed. From the report we learn that CSIS found a shortage in the following roles...

Comments  (2)

7c5c876d1933023ac375eead04302e1a

Hey ISC2 - Where is the Opt Out Button?

July 15, 2011 Added by:Boris Sverdlik

I am a security researcher, and my presentation at Security Bsides was written in the same form that most “pen testing” classes are. If you are naïve enough to believe that criminals don’t use security tools in their efforts, then my friend it is finally time to hang up that hat...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »
Most Liked