What’s the biggest problem in computer security, according to valsmith at carnal0wnage.attackresearch.com? Well, it’s…
Staffing.
As the author admits, the post leans toward self-promotion of the company, but it makes many good points and deserves a read and a good pondering.
Continue reading →
Like this:
Like Loading...
Filed under Audit, Security
Tagged as analyst, big 4, budget, certification, cisa, CISSP, compliance, computer, consultants, CPEs, data mining, demand, documentation, exam, exploit, IS, little 4, lone ranger, management, penetration, problem, sans, Security, skills, sox, supply, valsmith
When you use a shared PC, sometimes you get to share other people’s passwords. Especially when people are kind of led to believe they’re safe.
I was wandering around the security landscape last week and was at a client’s business which is quite large and has kiosk PCs for employees and visitors to use to access the open Internet (they lock social networking and other stuff down pretty tight on the business network, so usually you see lines of people tapping away at the rows of kiosk PCs).
Continue reading →
Like this:
Like Loading...
Filed under Security, Security Scout
Tagged as clueless, computer, cookie, God, kiosk, linkedin, login, password, prayer, shared
According to CIO magazine, here’s the hot IT jobs (followed by comments by me in italics):
NOTE: IT Auditors, don’t pass over this article!
1. Security specialist/ethical hacker
One specialty, computer forensics, is hot. Forensic labs are almost always behind in their work. Is it due to a lack of good technicians or that forensic folks aren’t cheap? Either answer is good news.
Continue reading →
Like this:
Like Loading...
Filed under Top 10
Tagged as business, capacity, CIO magazine, cloud computing, computer, cost savings, Denise Dubie, engineer, ethical hacker, forensics, forrester research, Gartner, gartner-speak, health records, it auditor, Linux, manager, network, network world, open source, Oracle-style pricing, permissions, process, re-engineering, saving money, Security, specialist, training, Unix, virtual systems, virtualization