article thumbnail

Acknowledging Our Love-Hate Relationship With Security Certifications

Forrester IT

Even the most innocuous posts somehow manage to offend or anger someone out there on the internet. But that doesn’t mean that it should all be dismissed as nonsense, especially when it comes to information security. It’s nothing new that social media is a hotbed of hot takes.

Security 195
article thumbnail

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. From: [link].

Security 293
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

We have so much change happening and we can drive it to happen in a more positive way to reduce the resource needs for organizations and actually scale security for businesses of all sizes.". "We This is pretty powerful because now we all know how to secure systems and it's been validated by a third party that's a nonprofit and trusted.

CTO 80
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

article thumbnail

9 biggest information security threats through 2019

Network World

The information security threat landscape is constantly evolving. But that dependence makes them vulnerable to attacks on core internet infrastructure, devices used in daily business and key people with access to mission-critical information. Theme 1: Disruption from an over-reliance on fragile connectivity.

article thumbnail

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

One of the many topics coved at the event was software defined perimeter and cloud security alliance. Some of the issues discussed include the Internet of things, hacktivists and cyber attacks. Coca-Cola was used as a case study. Alan Boehme , the acting CISO at Coca-Cola. Next Steps for the Cybersecurity Framework (vormetric.com).

article thumbnail

Net Threats: Internet Openness in Danger

CTOvision

Reflecting the increasing attention paid to information security by many Americans, Pew Research recently conducted a large study, “ Net Threats ”, to identify important trends among technology experts’ opinions and predictions regarding the future of digital security.

.Net 269