Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Cyber InfoSec education infosec security awareness tools training

The Latest Developments In Corporate Data Security

CTOvision

The Latest Developments In Corporate Data Security Corporate data security is defined as the processes by which sensitive information is accessed only by authorized individuals and then destroyed when it is no longer needed. Proactive measures, including software purchases, third-party services, and internal company policies, offer data security solutions that would prevent most types of […]. Big Data Cloud Computing CTO Cyber Security

Trending Sources

The Security profession: Offense vs. Defense

Doctor Chaos

Lately there has been some articles and conversations around the security profession, particularly the ‘how to get started’ aspect. My good friend, Aamir Lakhani wrote a great article on getting started in cyber security ([link] I thought I would add some additional considerations for aspiring security professionals by describing the two primary aspects of operational […]. Cyber education infosec security awareness tools training

Microsegmentation – Secure Your Internal Network

CTOvision

Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

Innovative Thinking Is Hurting Security; We Need Disruptive Ideas

CTOvision

Security professionals by their nature are risk averse. Thus it’s no surprise that the security industry is defined by incremental innovation. Unfortunately "innovative security" strategy is leading to an increase in cyber security failures. Junaid Islam.

HPE’s Gen10 Servers Will Have Security Drilled into Silicon

Data Center Knowledge

The company's custom silicon enables security at the firmware level. Design Hardware Hewlett Packard Enterprise SecurityRead More.

Microsoft: Government Should Regulate IoT Security

Data Center Knowledge

Azure IoT engineering head says bar is low in IoT security, and government should get involved Read More. Business Cloud Featured Internet of Things Microsoft Regulation Security

Microsoft Launches Security Score for Office 365

Data Center Knowledge

Cloud Computing Microsoft Security SharedOne company says it will use scores in determining cyberinsurance premiums Read More.

Cyber Security in Aviation

CTOvision

Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. During the 2015 Global Connected Aircraft Summit , a session was dedicated to the topic of aviation cyber security: “Cyber Security: How Can a Connected Aircraft Manage This Threat?” The increase of technology does not match the increase in technology security.

Cyber security a business necessity

Computer Weekly

Cyber security is a business necessity, according to the T-Mobile security chief in Poland

Recovering From a Security Breach

CTOvision

There are few things more unsettling for a company than being the victim of a security breach. If you’re looking to recover from your own security breach, it’s best to keep the following tips in mind. Cyber Security Cyber Threats NewsRick Delgado.

How Cloud is Getting Security Right

Data Center Knowledge

We take a look at the modern cloud architecture and have to understand the underlying security that supports it. The good news is that cloud security has become a lot better. Now, find out where cloud is getting security right and how you benefit. Cloud Computing Security cloud securityRead More.

Debunking Unfounded Cloud Security Fears

Data Center Knowledge

The scale of security breaches today is unprecedented, but how many of them happen to the biggest cloud providers? Cloud Computing SecurityRead More.

Cyber security comes down to culture, say Dutch security experts

Computer Weekly

IT security can no longer be seen as just a technical matter. People, education and management matter too, but culture is the overarching and binding element, says security executive at Dutch bank

What’s The Biggest Data Security Threat In Your Business? The Answer Might Surprise You

CTOvision

At the same time, though, you might well be ignoring the biggest security threat your business will ever face. When it comes to data security, we hear a lot about how cyber attackers are becoming more sophisticated or that cloud technology is full of risks,” writes Dustin Childs of TechCrunch.

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

IoT security window closing

Computer Weekly

The window of opportunity for addressing security risks in internet of things devices is closing rapidly, according to Intel's IoT security manager

Intel 84

A Flicker Of Light: A new security stack points the path to safety

CTOvision

Defense-in-depth, the gold standard in cyber security, has failed. The basis behind defense-in-depth is to deploy redundant layers of security products to defeat every part the cyber kill chain. Conceptually the new security stack is a hardware-based virtual enclave.

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery

CEB IT

10 Ways Digitalization is Upending Information Security. A recent survey of around two dozen heads of information security produced a useful overview of the nature of this problem and how some of the world’s most forward-thinking teams are responding.

Five Security Best Practices for Cloud and Virtualization Platforms

Data Center Knowledge

Getting bogged down by cloud and security? Cloud Computing Security cloud securityCheck out these ways to lock down your cloud and virtualization platform! Read More.

Confidential Blog Post On Email Security

CTOvision

Unfortunately the national security issues relating to sensitive content is no laughing matter. The big news isn’t that emails are being stolen but that people thought that it was secure in the first place. 2 Secure your email system At the bare minimum implement 2 factor authentication and encryption on your email archive. This seems complex but public cloud hosted services and software based security solutions have made this easier. Junaid Islam.

Firemon: Providing proactive security intelligence and governance over your IT

CTOvision

With this post we are initiating coverage of Firemon, provider of proactive security intelligence and governance capabilities. Firemon enables enterprises to continuously analyze, visualize and improve the capabilities of your existing network security infrastructure.

Perimeter Security: Strategies for Data Center Protection

Data Center Knowledge

Securing the new perimeter in the age of cloud Read More. How to… Manage Security

Security Think Tank: Top three DNS-related security risks

Computer Weekly

What are the main security risks associated with the domain name system and how are these best mitigated

10 New Information Security Roles for the Digitization Era

CEB IT

High demand and a limited pool of people with the right skills and experience make information security staffing a perennial challenge. Further complicating things is the fact that information security teams have not yet adapted to their changing role in digitizing companies.

Security requires long haul planning

Cloud Musings

It also complicates many aspects of data security for any enterprises doing business across the Atlantic Ocean. This recent ruling highlights the value of having a strong security partner shepherding your enterprise through these types of perturbations.

Dell 106

The October 2013 security updates

IT Pros Rock!

MS13-080 | Cumulative Security Update for Internet Explorer This security update resolves 9* issues in Internet Explorer. MS13-081 | Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution This security update resolves seven issues in Microsoft Windows.

Three Reasons Network Security Policy Management is a Big Deal

Data Center Knowledge

Data Center World Networking SecurityUpwards of 95 percent of breaches can be prevented by better managing existing technologies Read More.

Five cyber security imperatives for all companies

Computer Weekly

There are five things all companies should ensure they are doing in terms of cyber security

Storage and Security: Five Things You Need to Understand

Data Center Knowledge

Cloud Computing Security Storage cloud security How do you take cloud, data control, and even compliance into consideration? Read More.

Your 2015 Cloud Security Update

Data Center Knowledge

Some quick tips and cool technologies to help your cloud security architecture and to keep your environment a bit safer! Cloud Computing Security Read More.

The Internet of (Secure) Things – Embedding Security in the IoT

CTOvision

Security alarm systems have communicated with operations centers and police for a long time, but now allow monitoring and control from your smartphone. With these burgeoning capabilities, there needs to be some focus on cyber security. By George Romas.

Enterprise Cloud Security Startup Skyhigh Raises $40M

Data Center Knowledge

Cloud Computing Enterprise Investing SecurityShare price indicates a down round, but CEO begs to differ Read More.