article thumbnail

What it takes to become an IT security engineer

Network World

When Scott Copeland got his associate degree in network administration back in 2004, the community college he attended didn’t offer IT security courses, “but it gave me the foundation to learn more about network security,” he says. Also, he notes, “because it ties networking for firewalls and VPN, it has security components to it.”

article thumbnail

The biggest security threat in the digital age is…

I'm not lost, I'm wondering

A recent blog post by Dave Snowden and some commentary by Luis Suarez have reminded me of something Bruce Schneier said a while back (in 2004, actually): Since the beginning of time, people have always been the biggest security threat. People are why firewalls are invariably misconfigured. That hasn’t changed because of computers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Boston KM Forum Event: Virtual Teams and Social Media Tools, Part 1

Victus pro Scientia Opus -- Food for the Knowledge

studies performed/published on virtual team effectiveness (including a great article from the May, 2004 Harvard Business Review -- subscription required for full article). Ifyour collaboration strategy doesn't include people outside your entity/firewall/premises, you're missing the point.

article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Steve was previously CTO of Sanctum, a pioneer in Web application security testing and firewall software. Steve is a recognized expert and frequent lecturer on enterprise security and was named one of InfoWorld''s Top 25 CTO''s of 2004 and, in 2009, was named a fellow at the Center for Advanced Defense Studies. where he was their CSO.

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Steve was previously CTO of Sanctum, a pioneer in Web application security testing and firewall software. Steve is a recognized expert and frequent lecturer on enterprise security and was named one of InfoWorld''s Top 25 CTO''s of 2004 and, in 2009, was named a fellow at the Center for Advanced Defense Studies. where he was their CSO.

article thumbnail

Fountainhead: Infrastructure Orchestration in use within SPs.

Fountainhead

Savvis In 2004, Savvis set a goal to become the industry’s first totally virtualized utility computing data center, integrating virtualized servers, storage, networks, and security into an end-to-end solution. For this segment, the Infrastructure Orchestration approach is essentially used to build Infrastructure-as-a-Service, or IaaS.

article thumbnail

SeanDaniel.com [tech]: Introducing a new line of Network Storage.

Sean Daniel

you can't do both because the ports can't be shared (unless of course you happen to also be running a high-end firewall like Microsoft's TMG (ISA). ► 2004. (67). However, please note that you can only run RWA on either the standard box, or the NAS box. have at it! 2/07/2012 11:50 AM. Cheap postcard print.

Storage 48