CIO magazine has a slideshow about 12 security geeks that have accomplished amazing things. Topics touched on:
Tag Archives: CIO magazine
12 “White Hat” Hackers You Should Know
Top 10 IT Jobs
According to CIO magazine, here’s the hot IT jobs (followed by comments by me in italics):
NOTE: IT Auditors, don’t pass over this article!
1. Security specialist/ethical hacker
One specialty, computer forensics, is hot. Forensic labs are almost always behind in their work. Is it due to a lack of good technicians or that forensic folks aren’t cheap? Either answer is good news.
Share this:
- Click to print (Opens in new window)
- Click to share on Twitter (Opens in new window)
- Click to share on Reddit (Opens in new window)
- Click to share on Telegram (Opens in new window)
- Click to share on Pocket (Opens in new window)
- Click to share on LinkedIn (Opens in new window)
- Click to email a link to a friend (Opens in new window)
- Click to share on Tumblr (Opens in new window)
- Click to share on WhatsApp (Opens in new window)
- Click to share on Facebook (Opens in new window)
- Click to share on Pinterest (Opens in new window)
- Click to share on Skype (Opens in new window)
Filed under Top 10
Tagged as business, capacity, CIO magazine, cloud computing, computer, cost savings, Denise Dubie, engineer, ethical hacker, forensics, forrester research, Gartner, gartner-speak, health records, it auditor, Linux, manager, network, network world, open source, Oracle-style pricing, permissions, process, re-engineering, saving money, Security, specialist, training, Unix, virtual systems, virtualization
Old Flaws R the Flaw
TrustWave Inc. analyzed data gathered from over 1900 penetration tests and over 200 data breach investigations and concluded that the top 3 ways to sneak into a network in 2009 were via:
Share this:
- Click to print (Opens in new window)
- Click to share on Twitter (Opens in new window)
- Click to share on Reddit (Opens in new window)
- Click to share on Telegram (Opens in new window)
- Click to share on Pocket (Opens in new window)
- Click to share on LinkedIn (Opens in new window)
- Click to email a link to a friend (Opens in new window)
- Click to share on Tumblr (Opens in new window)
- Click to share on WhatsApp (Opens in new window)
- Click to share on Facebook (Opens in new window)
- Click to share on Pinterest (Opens in new window)
- Click to share on Skype (Opens in new window)
Filed under Security
Tagged as CIO magazine, data breach, marcus ranum, old flaw, patch management, pentration tests, remote access, security survey, sql injection, trusted connection, trustwave