Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Cyber InfoSec education infosec security awareness tools training

The Latest Developments In Corporate Data Security


The Latest Developments In Corporate Data Security Corporate data security is defined as the processes by which sensitive information is accessed only by authorized individuals and then destroyed when it is no longer needed. Proactive measures, including software purchases, third-party services, and internal company policies, offer data security solutions that would prevent most types of […]. Big Data Cloud Computing CTO Cyber Security

Trending Sources

The Security profession: Offense vs. Defense

Doctor Chaos

Lately there has been some articles and conversations around the security profession, particularly the ‘how to get started’ aspect. My good friend, Aamir Lakhani wrote a great article on getting started in cyber security ([link] I thought I would add some additional considerations for aspiring security professionals by describing the two primary aspects of operational […]. Cyber education infosec security awareness tools training

Microsegmentation – Secure Your Internal Network


Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

Vidder: Securing business critical apps, transparently


For context see the short introduction at this video: Vidder is changing how modern day enterprises approach security in an increasingly untrusted IT landscape. PrecisionAccess™ enables secure, trusted access to critical business applications in today’s perimeterless enterprise.

Innovative Thinking Is Hurting Security; We Need Disruptive Ideas


Security professionals by their nature are risk averse. Thus it’s no surprise that the security industry is defined by incremental innovation. Unfortunately "innovative security" strategy is leading to an increase in cyber security failures. Junaid Islam.

Cyber Security in Aviation


Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. During the 2015 Global Connected Aircraft Summit , a session was dedicated to the topic of aviation cyber security: “Cyber Security: How Can a Connected Aircraft Manage This Threat?” The increase of technology does not match the increase in technology security.

HPE’s Gen10 Servers Will Have Security Drilled into Silicon

Data Center Knowledge

The company's custom silicon enables security at the firmware level. Design Hardware Hewlett Packard Enterprise SecurityRead More.

Microsoft: Government Should Regulate IoT Security

Data Center Knowledge

Azure IoT engineering head says bar is low in IoT security, and government should get involved Read More. Business Cloud Featured Internet of Things Microsoft Regulation Security

Microsoft Launches Security Score for Office 365

Data Center Knowledge

Cloud Computing Microsoft Security SharedOne company says it will use scores in determining cyberinsurance premiums Read More.

Recovering From a Security Breach


There are few things more unsettling for a company than being the victim of a security breach. If you’re looking to recover from your own security breach, it’s best to keep the following tips in mind. Cyber Security Cyber Threats NewsRick Delgado.

How Cloud is Getting Security Right

Data Center Knowledge

We take a look at the modern cloud architecture and have to understand the underlying security that supports it. The good news is that cloud security has become a lot better. Now, find out where cloud is getting security right and how you benefit. Cloud Computing Security cloud securityRead More.

Debunking Unfounded Cloud Security Fears

Data Center Knowledge

The scale of security breaches today is unprecedented, but how many of them happen to the biggest cloud providers? Cloud Computing SecurityRead More.

What’s The Biggest Data Security Threat In Your Business? The Answer Might Surprise You


At the same time, though, you might well be ignoring the biggest security threat your business will ever face. When it comes to data security, we hear a lot about how cyber attackers are becoming more sophisticated or that cloud technology is full of risks,” writes Dustin Childs of TechCrunch.

Cyber security comes down to culture, say Dutch security experts

Computer Weekly

IT security can no longer be seen as just a technical matter. People, education and management matter too, but culture is the overarching and binding element, says security executive at Dutch bank

Cyber security requires man and machine, says F-Secure

Computer Weekly

Like other cyber security firms, Finland’s F-Secure is building an artificial intelligence capability into its products and services, but says this is no replacement for cyber security professionals

Cyber security a business necessity

Computer Weekly

Cyber security is a business necessity, according to the T-Mobile security chief in Poland

IoT security window closing

Computer Weekly

The window of opportunity for addressing security risks in internet of things devices is closing rapidly, according to Intel's IoT security manager

Intel 84

A Flicker Of Light: A new security stack points the path to safety


Defense-in-depth, the gold standard in cyber security, has failed. The basis behind defense-in-depth is to deploy redundant layers of security products to defeat every part the cyber kill chain. Conceptually the new security stack is a hardware-based virtual enclave.

Five Security Best Practices for Cloud and Virtualization Platforms

Data Center Knowledge

Getting bogged down by cloud and security? Cloud Computing Security cloud securityCheck out these ways to lock down your cloud and virtualization platform! Read More.

Firemon: Providing proactive security intelligence and governance over your IT


With this post we are initiating coverage of Firemon, provider of proactive security intelligence and governance capabilities. Firemon enables enterprises to continuously analyze, visualize and improve the capabilities of your existing network security infrastructure.

The October 2013 security updates

IT Pros Rock!

MS13-080 | Cumulative Security Update for Internet Explorer This security update resolves 9* issues in Internet Explorer. MS13-081 | Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution This security update resolves seven issues in Microsoft Windows.

Confidential Blog Post On Email Security


Unfortunately the national security issues relating to sensitive content is no laughing matter. The big news isn’t that emails are being stolen but that people thought that it was secure in the first place. 2 Secure your email system At the bare minimum implement 2 factor authentication and encryption on your email archive. This seems complex but public cloud hosted services and software based security solutions have made this easier. Junaid Islam.

Security requires long haul planning

Cloud Musings

It also complicates many aspects of data security for any enterprises doing business across the Atlantic Ocean. This recent ruling highlights the value of having a strong security partner shepherding your enterprise through these types of perturbations.

Dell 106

Security Think Tank: Top three DNS-related security risks

Computer Weekly

What are the main security risks associated with the domain name system and how are these best mitigated

Perimeter Security: Strategies for Data Center Protection

Data Center Knowledge

Securing the new perimeter in the age of cloud Read More. How to… Manage Security

Storage and Security: Five Things You Need to Understand

Data Center Knowledge

Cloud Computing Security Storage cloud security How do you take cloud, data control, and even compliance into consideration? Read More.

Your 2015 Cloud Security Update

Data Center Knowledge

Some quick tips and cool technologies to help your cloud security architecture and to keep your environment a bit safer! Cloud Computing Security Read More.

Three Reasons Network Security Policy Management is a Big Deal

Data Center Knowledge

Data Center World Networking SecurityUpwards of 95 percent of breaches can be prevented by better managing existing technologies Read More.

10 New Information Security Roles for the Digitization Era


High demand and a limited pool of people with the right skills and experience make information security staffing a perennial challenge. Further complicating things is the fact that information security teams have not yet adapted to their changing role in digitizing companies.

The Internet of (Secure) Things – Embedding Security in the IoT


Security alarm systems have communicated with operations centers and police for a long time, but now allow monitoring and control from your smartphone. With these burgeoning capabilities, there needs to be some focus on cyber security. By George Romas.

Sorry, cloud resisters: Control does not equal security

David Linthicum

Cloud Computing Security Cloud Security Do you remember last Christmas? Target lost data from about 40 million credit and debit cards that were stolen at its stores between Nov. 27 and Dec. 15, the height of the holiday shopping period. Thieves tampered with the sales terminals'' card swipers to gain access to the data stored on the magnetic stripe on the back of credit and debit cards. read more.

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery


10 Ways Digitalization is Upending Information Security. A recent survey of around two dozen heads of information security produced a useful overview of the nature of this problem and how some of the world’s most forward-thinking teams are responding.