IT - Security
10 Jul 2017
#64868
Desperately Seeking Security: 6 Skills Most In Demand
Dark Reading, July 8th 2017

'When people say there's a security skills gap, this is what they really mean...

The last several years have seen a slew of reports coming out lamenting the typical enterprise's ability to recruit and retain quality cybersecurity talent.

Earlier this year, ISACA's Cybersecurity Nexus survey found that more than one in four organizations take six months or longer to fill priority cybersecurity positions..."
(Get More Information . .)

11 Jul 2017
#64880
How to Write an Information Security Analyst Job Description
CSO Online, July 11th 2017

"A thorough, clear job description will ensure that security analysts stay on the same page with management expectations.

Whatever the role, good communication regarding the duties and expectations of a security professional is key to that person's success. That communication starts with a solid, thorough job description. It will be an important benchmark when hiring for the role, and a touch point for performance once the candidate is on board..."
(Get More Information . .)

11 Jul 2017
#64861
Businesses Overconfident About Keeping Attackers at Bay
HelpNet Security, July 11th 2017

"Despite the increasing number of data breaches and nearly 1.4 billion data records being lost or stolen in 2016, the vast majority of IT professionals still believe perimeter security is effective at keeping unauthorized users out of their networks. However, companies are under investing in technology that adequately protects their business, according to Gemalto..."
(Get More Information . .)

11 Jul 2017
#64892
Top security tools of 2017
CSO Online, July 11th 2017

"Go hands-on with some of the most innovative and useful security tools from today's most important cybersecurity technology categories...

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or profitable, many others of the same type will inevitably follow. The best defenses need to mirror those trends so users get the most robust protection against the newest wave of threats. Along those lines, Gartner has identified the most important categories in cybersecurity technology for the immediate future..."
(Get More Information . .)

10 Jul 2017
#64876
How Code Vulnerabilities Can Lead to Bad Accidents
Dark Reading, July 10th 2017

"The software supply chain is broken. To prevent hackers from exploiting vulnerabilities, organizations need to know where their applications are, and whether they are built using trustworthy components.

When a car manufacturer discovers a faulty part, it is obliged to issue a recall and notify its customers of the damaged product. The problem is that all these cars are already on the road driving around with a recalled part, causing immense amounts of liability for all parties involved..."
(Get More Information . .)

    14 Jul 2017
    #64888
    The 5 worst big data privacy risks (and how to guard against them)
    CSO Online, July 14th 2017

    "There are enormous benefits from Big Data analytics, but also massive potential for exposure that could result in anything from embarrassment to outright discrimination. Here's what to look out for - and how to protect yourself and your employees..."
    (Get More Information . .)

    See all archived IT - Security articles See all articles from this issue