article thumbnail

IDG Contributor Network: Cyber crime as a service forces changes in information security

Network World

Just use Google to learn how to access the Dark Web, and you can find hackers who, for a price, are more than happy to write malware, create highly effective spear phishing campaigns and develop bogus websites for harvesting login credentials. Also on Network World: DDoS-for-hire services thrive despite closure of major marketplace +.

article thumbnail

Is Information Security the Right Profession for Me?

Linux Academy

Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. In this post, I’ll fill you in about some of the available jobs in information security and what it takes to succeed in each one.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

‘The key is the cloud’: How to keep up with the speed of innovation

CIO Business Intelligence

At DISH Network , cloud-adoption strategies vary by when the parts of its business started – from those born in the cloud to legacy sectors deploying cloud on an opportunistic basis. Priceline Chief Technology Officer Marty Brodbeck will share how the online travel agency sped up its cloud native software production.

Cloud 131
article thumbnail

IDG Contributor Network: How to build a thriving information security function despite the talent shortage

ComputerWorld IT Management

It seems that the industry has reached a nearly unanimous conclusion about a key essential for tight information security -- people. As an example, following a major security breach at the U.S. Office of Personnel Management, the agency announced that it would fill 1,000 information security positions.

article thumbnail

How to gain a five star security reputation in hospitality

CIO Business Intelligence

transition Step 1: Locate, identify and document all the credit card flow in the organization, as stated by the following requirements applicable to all entities subject to PCI security compliance: 1.2.4 An accurate data-flow diagram(s) is maintained that meets the following: • Shows all account data flows across systems and networks.

Security 105
article thumbnail

How to close up the holes in your network

Network World

There might be one or more cloud services linking to your corporate and partner network, all being accessed by both mobile and traditional users. How can you enforce internal policies and industry compliance mandates when there’s no longer an identifiable network perimeter?

Network 60
article thumbnail

Middle East cybersecurity industry explores how to engage more women

CIO Business Intelligence

Despite much discussion about how to icrease the percentage of women in cybersecurity roles over the last decade, women make up only 25% of the global cybersecurity workforce, according to the latest (ISC)² Cybersecurity Workforce Study. So I tried to network with the right people and ask the right questions.