Has Mark Zuckerberg left Facebook? No, but a bug made it look that way
Zuckerberg isn’t quitting Facebook quite yet, but a quirky bug in the website could have made it appear that he had quit, if you knew how to manipulate a career Life Events post, as a security researcher did using Zuckerberg’s timeline. more…Don’t use general recruiters in security salary negotiations
In part 1, I wrote of the disparity in information security salaries between what is being offered and the true market rate. For those in the salary phase of an offer, Andrew Hay has created a handy Salary Negotiation Workbook that can make the often tenuous salary negotiations easier. One of the benefits of using […] more…Five moves for every new CISO’s playbook
CISOs are pulling up roots and moving to new companies at a rapid pace as demand grows for leaders with cyber and information security expertise and salaries skyrocket. Many veteran infosec professionals are also joining the CISO ranks for the first time as companies add the position to their C-suites. To read this article in […] more…Heat map to show where burning need is for cybersecurity pros
The National Institute of Standards and Technology (NIST) is funding creation of a heat map visualization tool that will show where cybersecurity jobs are open across the country. The first rendition should be out late next year. The project, funded through NIST’s National Initiative for Cybersecurity Education (NICE), will provide data to help employers, job seekers, policy […] more…4 Interview questions for data security analysts
Recent data breaches, like those at Xero, Experian and TalkTalk, are one of the many reasons data security analysts are in high demand. To read this article in full or to leave a comment, please click here (Insider Story) more…The security talent shortage and your leadership opportunity
Reframing the talent shortage Image by Steven Guzzardi “Identify your problems, but give your power and energy to solutions.” — Tony Robbins Much is written about a talent shortage in the security industry. The theme weaves into presentations. We discuss it in the hallways, on podcasts, and when we get the chance. Many offer examples […] more…CSO salaries expected to skyrocket
By many accounts, 2015 was the year of the big data professional, with data scientists even being hailed as the “sexiest job of the year” by one study. But 2016 may emerge as the year of the chief security officer, as another new study reveals that pay for CSOs is rising faster than most every […] more…What will the CISOs of 2020 look like?
Ever since its inception in the late 1990s, the CISO job has tended to be a very technical job. The CISO would likely report to the CIO and have a varied background as a system or network administrator, or perhaps as a security analyst in a security operations center (SOC). Almost all CISOs were male, […] more…Infamy and alias: 11 famous hackers and their handles
You could be whoever you wanted Image by flickr/the euskadi 11 The origins of what we think of as modern hacker culture emerged from the same California milieu as the 1960s counterculture, and it shows. In 1973, programmers from Berkeley who had worked on the time-sharing Berkeley Operating System launched Community Memory, the first public […] more…How to ace the CISO interview — be ready for the tough questions
Getting a top job in information security has never been as simple as just having the required training and experience. Yes, those are mandatory, but the modern hiring process also includes personality evaluations to determine the so-called “XQ” – whether a candidate would be a good “fit” for a position – background checks and yes, […] more…Cultivate a Talent Pipeline While Bridging the Cybersecurity Resource Gap
This is the time of year when students around the world head back to school. Many entering their final year of high school and those in college or at universities are thinking about courses of study that hold promising career opportunities, excitement, and challenge. read more more…This Little Amiga Still Runs School District’s HVAC
It’s the rare tech worker that manages a decade in any one job these days – employee loyalty is just so 1980s. But when you started your career in that fabled age, some of the cultural values might have rubbed off on you. Apparently that’s the case for an Amiga 2000 that’s been on the […] more…Microsoft follows Google to crack down on revenge porn
Microsoft will make it easier for people to request the removal of links to intimate images or videos from the company’s Bing search engine if such content was posted online without their consent. This move comes in response to an increasingly prevalent phenomenon dubbed “revenge porn,” where jilted former partners or extortionists upload sexually explicit […] more…8 most in-demand IT security certifications
In-demand IT security certifications Image by Thinkstock As high-profile security breaches (e.g., Target, Sony, Adobe and most recently, Ashley Madison) continue to dominate headlines, companies are doubling down on pay to hire the best and the brightest IT security professionals. The most recent IT Skills and Certifications Pay Index (ITSCPI) from research and analysis firm […] more…Google ad profiling: what’s causing the gender discrimination?
Google displayed ads for a career coaching service for “$200k+” jobs 1852 times to the male profiles and only 318 times to female profiles. But is it Google’s fault? more…Practical guidance for CISOs from former federal security adviser
In this edition of the Irari Report, Ira Winkler and Araceli Treu Gomes interview Howard Schmidt, who served as the cybersecurity adviser to both President George W. Bush and President Barrack Obama, Chief Information Security Officer of Microsoft and eBay, among other senior and operational roles in industry and government. Schmidt provides extremely practical guidance […] more…More information
- Windows 10 Can Detect PowerShell Attacks: Microsoft
- Google Safe Browsing Program 5 Years Old – Been Blacklisted Lately?
- The Importance of a Home Inspection Before Buying a Condo
- Key Senate Panel Approves $250 Million for Election Security
- Malware Attack Permanently Shuts Down OpenX OnRamp
- Facebook app left 3 million users’ data exposed for four years
- As videoconferencing needs change, it’s time to plan for what comes next
- WordPress Attacks Powered by Router Botnet Drop Rapidly
- Mirai, Gafgyt IoT Botnet Attacks Intensify
- SecureGmail: The easiest way to send encrypted emails through Gmail