Items Tagged with "Training"


Fourteen Important Security Policy Strategies

May 24, 2011 Added by:Global Knowledge

In light of today's information economy, security is essential across every aspect of both small and large organizations. Without sensible security, an organization is at risk not only from malicious outsiders but also ill-intentioned employees or random mistakes...

Comments  (0)


Social Engineering Gains Ever More Credibility

May 24, 2011 Added by:PCI Guru

At the end of the day, everything in an organization’s security posture comes down to the people who interact with the information you are trying to protect. It only takes one person having a bad day to make all of an organization’s security technology and other controls impotent...

Comments  (0)


The Top Eleven IT Skills for 2011

May 22, 2011 Added by:Global Knowledge

Security will always be a hot skill set. All IT pros must have a good understanding of both physical and electronic security. This does not mean that every IT Pro must be able to perform a penetration test, but they must understand and prevent attacks against their network...

Comments  (0)


Every Employee is a Security Partner

May 18, 2011 Added by:Robb Reck

By using a well-tested framework we can ensure that our organization’s security needs are adequately documented. The policies are critical, but they are only the framework. To flesh out the program we need the actual implementation, and that’s where the rest of the staff comes in...

Comments  (4)


Which Version of the Security+ Exam Will You Try?

May 11, 2011 Added by:Global Knowledge

Attempting the new exam offers the opportunity to become certified on the latest and greatest version of the test and, after all, almost everyone likes something new. So here’s my question to each of you: When such situations arise which exam would you plan to attempt?

Comments  (0)


Majority of Web Apps Deployed with Security Flaws

April 26, 2011 Added by:Headlines

Veracode analyzed nearly five-thousand applications submitted to its cloud-based testing service over the period of eighteen months and found that more than half of the software had some sort of significant security flaw. “Software remains fundamentally flawed," the report states...

Comments  (0)


Fifteen Top Paying IT Certifications

April 19, 2011 Added by:Global Knowledge

When most individuals hear the word "Certification", dollar signs immediately begin dancing in their heads. While some certifications do command a higher salary, this is not true for all. Time to look at some of the more popular certifications - and their associated pay...

Comments  (8)


HIPAA-HITECH Compliance Free Webinar Series

April 12, 2011 Added by:Jack Anderson

We held the first HIPAA-HITECH Compliance webinar on April 6 with gratifying results. A smart, interested group registered, attended, and asked great questions. This has encouraged us to continue the series. Space is limited for these FREE webinars, so reserve your seat now...

Comments  (0)


PCI SSC Updates the ASV Training Program

April 05, 2011 Added by:PCI Guru

The ASV training program has blindsided the ASV community as it was a total surprise. Yes, there has been talk over the years at the Community Meetings and in other venues regarding ASV qualifications and training, but nothing ever seemed to come from those discussions...

Comments  (0)


Cyber Security Strategies Summit: Security in a Digital World

April 05, 2011 Added by:Ben Zvaifler

A new wave of cyber warfare has taken form, targeting our information and threatening the stability of our nation's government and corporations worldwide. Security and privacy professionals have answered with innovative techniques in a constantly shifting environment...

Comments  (0)


Preparation Tips for the JNCIE-ER Certification Exam

April 04, 2011 Added by:Stefan Fouant

For this exam, you are really going to need to get your hands on several J-Series routers, or at the very least some M/T/MX-Series routers with Adaptive Services capabilities. This might require additional hardware on non J-Series devices...

Comments  (0)


Disruptive Innovation in HIPAA HITECH Compliance

April 01, 2011 Added by:Jack Anderson

Healthcare needs disruptive innovation. HIPAA HITECH provides an opportunity to profoundly change information security and privacy by bringing millions of new participants into the picture. HHS estimates that 1-2 million business associates need to become HIPAA HITECH compliant...

Comments  (0)


Webinar: HIPAA - HITECH Compliance for Smarties

March 28, 2011 Added by:Jack Anderson

Free Webinar: The key to successful compliance is having a clear step by step process, templated policies, procedures and forms, and having a personal privacy and security expert assigned to help you through the process. Delivering all this through cloud computing makes it cost effective...

Comments  (0)


Writing Mandatory Procedures for ISO 27001 / BS 25999-2

March 21, 2011 Added by:Dejan Kosutic

By implementing the procedures in a proper way, not only will you have your documentation up-to-date and under control, but you will also ensure that your internal audit makes sense and runs smoothly, and that you always improve your system in a systematic way...

Comments  (3)


IT Job Market Intel - Cutting Through the Fog

March 17, 2011 Added by:Mike Meikle

Once again, IT pros are going to have to develop significant business skills to set themselves apart from their mono-technical peers. While you may be able to capitalize on the Hot Skill Du Jour for a while, and we all have, it will continue to pay diminishing returns...

Comments  (0)


How to Become an ISO 27001 and BS 25999-2 Consultant

March 15, 2011 Added by:Dejan Kosutic

Becoming a consultant is not easy – not only do you have to excel in your knowledge of ISO 27001/BS 25999-2, you also have to be able to define and price your services, define and approach your target markets, manage your projects etc. If you approach this venture carefully, chances are you will succeed...

Comments  (0)

Page « < 15 - 16 - 17 - 18 - 19 > »