Thursday, October 23, 2014

5 non-traditional hiring tips for InfoSec

Snapchat, Whisper promise privacy but fail (miserably) to deliver | Cyber insurance: Worth it, but beware of the exclusions

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


5 non-traditional hiring tips for InfoSec
The majority of companies surveyed – 70 percent – says their IT security departments were understaffed. Read More


WEBCAST: Alcatel-Lucent Enterprise

Integrating Mobility with Unified Access
Meeting mobility demands of 4500 students, faculty and staff at a university is no small task. Join this Webcast to hear the Director of Enterprise Infrastructure explain the steps Abilene Christian University took to deliver a new level of student-faculty interaction. Learn More

WEBCAST: Sourcefire, now part of Cisco

Threat Intelligence In Incident Response/Management
In this webinar, hear from two experts on how you can empower your security team to quickly recover from and proactively defend against attacks while increasing the value of your existing security investment. Learn more >>

Snapchat, Whisper promise privacy but fail (miserably) to deliver
Privacy and anonymity in the era of social media are promises left unfulfilled. Are users to blame? Read More

Cyber insurance: Worth it, but beware of the exclusions
Cyber insurance can offset the costs of a major data breach. But experts caution that it can only ease the pain, not eliminate it. Read More

PCI compliance under scrutiny following big data breaches
Should PCI standards do more than set a baseline for security -- and should they be given teeth for when companies don't comply? Read More


: Riverbed | Orange

A CIO's Guide to Better Network Performance
IT consolidation is putting significant strains on the traditional network paradigm. The videos in this Knowledge Vault provide executive overviews of how to meet branch consolidation goals with an eye to a seamless hybrid networking architecture that is application-aware, simple to manage, and leverages application visibility and WAN optimization. Learn More

Microsoft discloses zero-day flaw, publishes quick fix
Microsoft has published a temporary fix for a new zero-day flaw that affects nearly all versions of Windows and is currently being exploited via PowerPoint. Read More

Android ransomware 'Koler' turns into a worm, spreads via SMS
The Koler ransomware locks the device screen and displays fake messages from police agencies. Read More

Google extends two-factor authentication with physical USB keys
Google Chrome gets support for new authentication protocol called Universal 2nd Factor. Read More


ITWORLD GIVEAWAYS:

We've got 5 copies of each of this books to give to some lucky ITworld readers. Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!

Introduction to Agile Methods
If you want to understand Agile and become conversant with Agile values, principles, framework, and processes, this book is the place to start. Enter now!

Programming in C, 4th Edition
Learn C by example, with complete C programs used to illustrate each new concept along the way. Enter now!

SALARY SURVEY:

What's your earning power? How does it compare with your peers'?

With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.