How to survive in the CISO hot-seat
The CISO is a precarious job. Research studies indicate that CISOs typically survive just 18 months to two years in a job which is increasingly complex and multi-skilled. After all, information security is no longer solely about managing firewalls and patch management, but rather a varied role encompassing business and technical skills. Add into that […] more…U.S. Cyber Command struggles to retain top cybersecurity talent
At U.S. Cyber Command, the top brass has made recruiting top talent a leading priority, but those efforts have been slowed by challenges in attracting and retaining the next generation of cyber warriors. Maj. Gen. Paul Nakasone, commander of Cyber Command’s Cyber National Mission Force, spoke to those struggles in a recent online event hosted […] more…How millennial tech grads should tailor their resumes
If you’ve just graduated from college and are looking to land a job in IT, here are four emerging trends you’ll want to highlight for prospective employers. more…Want a good tech job? Report says open-source skills are hotter than ever
Dice, a leading tech career company and the Linux Foundation have just published the 2016 Open Source Jobs Report. They found that 65 percent of HR managers say open-source hiring will increase more than any other part of their business over the next six months. At the same time, 79 percent of hiring managers have […] more…Using AI to multiply the efforts of human InfoSec analysts
Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors. The most frustrating fact in InfoSec is that attack information is there in the data, but today’s systems are not capable of getting to that data in time and, as a result, they […] more…How to trick traffic sensors
A detailed presentation of this research was delivered at RSA US 2016, and is available at https://www.rsaconference.com/writable/presentations/file_upload/tech-t09-smart-megalopolises.-how-safe-and-reliable-is-your-data.pdf In the past two years traffic sensors have mushroomed in Russian cities. Drivers using speed camera detectors were the first to spot the white boxes stuck to posts along the roadside. Their devices, designed to warn drivers about […] more…MIT’s new bug finder uncovers flaws in Web apps in 64 seconds
Finding bugs in Web applications is an ongoing challenge, but a new tool from MIT exploits some of the idiosyncrasies in the Ruby on Rails programming framework to quickly uncover new ones. In tests on 50 popular Web applications written using Ruby on Rails, the system found 23 previously undiagnosed security flaws, and it took […] more…Recruitment Challenges Continue to Plague Cyber Security
Recruitment remains a major problem for cyber security departments, and there seems to be no easy solution. One difficulty is that the issue is described in vague terms and throw-away statements: there’s a skills shortage; there are too many vacancies and not enough candidates; cyber security isn’t promoted as a worthwhile career in schools. read […] more…Security Sessions: How to transition from tech professional to a business leader
Many security pros came up through the career ranks with a solid tech background. But security leadership demands more business acumen and expertise today. Lorna Koppel, Direction of Information Security for Tufts University, has been through this process in her career and shares her tips for making the transition smoothly and effectively. more…Why you need a CSO/CISO
Your CIO has enough on her/his plate without taking on responsibility for security, too. While there’s plenty a CIO (or a CTO) can tackle when it comes to security, these roles are “generalists.” What you really need is a chief security officer or a chief information security officer (CSO/CISO) — a security specialist. The Cyber […] more…Digital rights group: Save security, reject FBI’s iPhone unlocking request
Digital rights group Fight for the Future is hoping to give voice to ordinary people concerned with the FBI’s attempt to force Apple to help it unlock the iPhone used by a mass shooter. Fight for the Future’s new Save Security campaign, launched Wednesday, will collect comments from people worried about the Internet security implications […] more…One-in-three developers fear A.I. will replace them
What keeps software developers up at night, other than coding? The fear that artificial intelligence systems can replace them, according to a new survey. Evans Data Corp., in a survey of 550 software developers, asked them about the most worrisome thing in their careers. A plurality, 29 percent, chose this answer: “I and my development […] more…The 6 hottest new jobs in IT
These leading-edge jobs could prove to be the most lucrative careers in tomorrow’s tech more…8 things keeping security professionals up at night
As the need for enterprise data and technology grows, it only widens the skills gap for security professionals. That means, security professionals are feeling the pressure to get more done with less. more…Card “Verification” Now Offered “As a Service” by Brazilian Cybercriminals
We highlighted in our Brazil underground report how rampant credit card fraud is in Latin America. One key step in this process is card verification – i.e., checking that the cards work. We’ve found a new service called CheckerCC that was meant to help make this easier. This is the first time that this capability has been offered […] more…Misconfigured Database Exposed Microsoft Site to Attacks
A researcher discovered that a database connected to the mobile version of Microsoft’s careers website was not properly configured, potentially allowing malicious actors to abuse it for various purposes. read more more…More information
- Chinese Hackers Lurked Nearly 400 Days in Networks With Stealthy BrickStorm Malware
- Resolved: Network, Video, and Voice Services Degradation
- Circle Sept. 10 on Your Calendar for Apple’s Big iPhone Event
- Resolved: Service interruption, JIRA, 1/15/2015
- Forgepoint Capital Places $15M Series A Bet on Converge Insurance
- How Chrome and Firefox could ruin your online business this month
- Apple releases ‘malware removal tool’ following computer hack
- Consumer cloud services causing ‘security time-bomb’ for enterprises
- Backdoor Trojan disguised as flight confirmation email hits German internet users
- CPR Deployments for Workday