Blog Posts Tagged with "Expert"
September 20, 2012 Added by:Richard Stiennon
Like in many matters involving science and technology, scientists and technologists should be brought into future deliberations on cyber legislation. The technologists that make the Internet operate and the security experts that battle to defend it need to be brought to the table...
September 19, 2012 Added by:Christopher Laing
For collective intelligence directed at security breaches, I would argue, that an effective means of transparently sharing details without fear of recrimination and embarrassment would greatly reduce the impact of such breaches. Fine idea, but how can this be achieved?
July 31, 2012 Added by:Headlines
Cyber war is complicated and defending systems demands world-class engineers and technicians and the military must compete with other public agencies and the private sector in attracting these specialists. Having the right people in the right places with the right training is the best defense against any attack...
June 18, 2012 Added by:Michelle Klinger
The general consensus regarding whether booth babes are appropriate is a resounding NO, yet vendors still find it necessary to use this strategy. Even amidst complaints by conference attendees & public mocking on social media sites, vendors stick to their marketing guns and bust out the busty femaninas...
June 03, 2012 Added by:Scott Thomas
The great thing about the people (and our industry as a whole) is that people attending were willing to share their thoughts and what they did to stave off burnout. The conference itself was awesome. The different tracks made it easy to have hallway-con, as well having a teaching area, and a lock-pick village...
May 30, 2012 Added by:Wendy Nather
There's a great discussion going on right now on Twitter about what's wrong with security conferences: Do we have too many? Are they focusing on the wrong things? Even if the hot topics are nominally the same, the perspectives and timbre of discussions will be very different...
May 17, 2012 Added by:Carter Schoenberg
What is more valuable, a SCADA security pro that understands a plant with such detail that his knowledge may never be rivaled, or a person who can also understand the organizations mission need and business drivers and can translate security into quantified risk measurements...
May 14, 2012 Added by:Scot Terban
Infosec is not a religion. There are no Cardinals, there are no Bishops, there are only a bunch of people who want their opinion to be heard and listened to ad nauseum. It’s as simple as that, and if you start clothing it in the robes of ecclesiastical rhetoric, you FAIL...
April 12, 2012 Added by:T.H. Enders
Breaking News: In uncanny synchronicity, CISOs, CSOs, auditors, and security consultants up and walked off their jobs today. It's hard to say what the repercussions will be. Pundits, analysts, and DHS are still trying to get a clear picture of the breadth of the problem...
November 22, 2011 Added by:Rafal Los
You don't just go to college, get a degree in 'software security' and walk into a job being great at it - mostly because that degree doesn't exist, but also because the days of being able to walk into a job like this are probably long behind us...
January 04, 2011 Added by:Headlines
Noted cyberwarfare expert John Wheeler's body was discovered on New Years Eve in a Delaware landfill. Wheeler was an expert in cyberwarfare and counter-ops technologies, and advised the military on the establishment of Cyberspace Forces as the Special Assistant to the Secretary of the Air Force...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013