Cybersecurity job openings are looking for people with a blend of technical, security, and industry-specific talents -- and it helps to know Python, Hadoop, MongoDB, and other big-data analysis tools, too.
Cybersecurity job postings grew by 91% between 2010 and 2014, faster than…
According to Verizon's 2015 Data Breach Investigations Report, more than 317 million new pieces of malware -- computer viruses or other malicious software -- were created in 2014. That means nearly one million new threats were released each day.
Someone has to…
The Air Force is on track to deliver in August 2016 the first of a series of advanced GPS satellites that promise to vastly improve the accuracy, reliability and security of the global positioning system constellation used by the military and civilian…
Innovations in microchips and semiconductors keep pushing advances in mobile computing devices, yet the battery technology that helps power those same devices remains stagnated. By some accounts, lithium-ion batteries haven’t changed much over the past 15 years.
That could change soon with developments…
Cybersecurity certification qualifications are becoming the norm in many job descriptions today as organizations seek quantifiable ways of measuring prospective employees’ expertise. But certification alone should not be the yardstick in determining how well a potential candidate will fit into an organization.…
As high profile cyberattacks make headlines, board members and senior management of companies large and small recognize that these attacks pose real threats to their revenue and reputations. As a result, investments in information security are essential.
So it would seem that chief…
