Blog Posts Tagged with "Education"
October 24, 2012 Added by:Fergal Glynn
The connection between improved security and user education is so well-established as to be almost axiomatic. Better technology, coding practices and testing can only accomplish so much. So what’s being done about the dearth of solid user education?
September 24, 2012 Added by:Tripwire Inc
Security people tend to be engineering oriented and suffer in the communication department. There’s an implied link that security might get broader adoption if security communication had more resonance with non-security people. Enter the popular use of the metaphor as meme...
September 18, 2012 Added by:Robert M. Lee
As my perspective in infosec comes from my role as a Cyberspace Operations Officer in the Air Force, where most people say “infosec” I say “cyber” and try to speak on the broader domain impacts, deterrence, sharing threat intelligence, education, and the importance of working together...
September 09, 2012 Added by:Jayson Wylie
The requirements involved with obtaining a certification past September 30th 2012 may not be beneficial for a CISO, andI do not know how applicants with this new certification will stand apart from those with graduate degrees in their understanding of security solutions...
August 22, 2012 Added by:Security BSides
The goal of Security BSides is to expand the conversation beyond the traditional confines. BSides creates opportunities to both present and participate in an atmosphere that encourages collaboration. It is where conversations for the next-big-thing are happening. You don’t want to miss it...
August 16, 2012 Added by:Security BSides
It’s time to revive this tradition and bring it to the modern day security conference. From an open call to the world, twelve teams representing hackerspaces and maker groups will be selected to come to Las Vegas to compete in four categories in front of a panel of judges to demonstrate what they have accomplished...
August 14, 2012 Added by:Pete Herzog
We need to get teenagers to realize how small they are in a big field. Hacking is a huge field and the one who knows the most about how things work is going to be the most powerful. That teaches students to respect that small bit of power they get from the lessons and to keep teaching things to themselves...
July 23, 2012 Added by:Infosec Island Admin
The NATO Cooperative Cyber Defence Centre of Excellence has developed an online Cyber Defence Awareness course that aims to enhance the general user’s awareness of cyber security risks and measures to mitigate those risks. The course may be accessed through the NATO Joint Advanced Distributed Learning portal...
July 18, 2012 Added by:InfoSec Institute
While no two jobs are alike, there are some specific skills that will help network security engineers face the various challenges they will face day to day. What follows are just a handful of specific skills and duties required of network security engineers...
June 19, 2012 Added by:Kelly Colgan
In conjunction with the National PTA Convention, Tim Woda will present about the specific risks plaguing parents and ways to mitigate their concerns. Matt Cullina will unveil findings from a Harris Interactive survey of parents about their child’s social networking habits and what issues cause them the most fear...
June 15, 2012 Added by:Headlines
Program graduates often develop into cyber experts who help to protect national-security information systems, commercial networks, and critical information infrastructure in both the private and public sectors – meeting the increasingly urgent needs of the U.S. government, industry, and academia...
June 08, 2012 Added by:Jayson Wylie
Government reports show that there is up to a fifty percent gap for information security needs to those able to fill them. This means that more and more people will attempt to enter into the information technology security field as the compensation for those who have security talent rises...
June 06, 2012 Added by:Marjorie Morgan
"Most cyber breaches are not conducted by hackers from the outside but poorly trained or rogue insiders. The primary vulnerability in the cyber system is the people. Unless we find a way to spur the market to create a cyber secure workforce we risk unilaterally disarming both our economy and our national defense"...
June 06, 2012 Added by:Headlines
“Today we face an increasing demand for the best and brightest in the cybersecurity field across industry, academia and government. DHS is committed to working with our partners... to develop the next generation of cyber professionals to protect against evolving cyber threats"...
June 04, 2012 Added by:Rafal Los
No matter how much we push to a connected world via digital mediums - the human interaction, the discussion, and the ability to have a deep and meaningful problem-solving session outside the confines of the office is one of the most valuable things you can ever provide for your organization...
May 30, 2012 Added by:Wendy Nather
There's a great discussion going on right now on Twitter about what's wrong with security conferences: Do we have too many? Are they focusing on the wrong things? Even if the hot topics are nominally the same, the perspectives and timbre of discussions will be very different...
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013
Starting to Clean Up the Mess from PCAnywher... Peggy Patterson on 06-18-2013