Cybersecurity job openings are looking for people with a blend of technical, security, and industry-specific talents — and it helps to know Python, Hadoop, MongoDB, and other big-data analysis tools, too. Cybersecurity job postings grew by 91% between 2010 and 2014, faster than overall IT jobs. The demand for cybersecurity professionals shows no signs of … Continue reading 5 Hot Security Job Skills
Publications
Truth in hacking
Antivirus company Avira reports a new wrinkle in malware: A phishing e-mail that contains explicit instructions for infecting your computer. It’s so crazy, it just might work.
So You Want to Be a Security Researcher?
According to Verizon’s 2015 Data Breach Investigations Report, more than 317 million new pieces of malware — computer viruses or other malicious software — were created in 2014. That means nearly one million new threats were released each day. Someone has to keep current with all the new malware that can be used to exploit … Continue reading So You Want to Be a Security Researcher?
Government needs help from IT vendors
Agencies are getting more and better technology, but IT is not providing the productivity and return that it could. Federal customers need to partner with vendors to focus on mission and outcome for IT, not just functionality and affordability.
Tenable Blog: Grappling with State and Local legacy IT
With many states relying on IT systems that are 20 years old or more, government agencies are challenged to secure legacy technology that is no longer supported and often hidden from view.
Tenable Blog: Payment Paradox – The True Cost of Payment Data Breaches
It’s natural to assume the most direct impact of a cyberattack within the financial payment system is the stolen data or funds. In reality, the true impact extends to the loss of consumer confidence and the subsequent increase of transactional costs. Most bankers subscribe to the notion that the payment system is the heart and … Continue reading Tenable Blog: Payment Paradox – The True Cost of Payment Data Breaches
Giving and taking: DOJ and NIST on opposite sides of cybersecurity
While the Justice Department is trying to get backdoors into mobile consumer devices, NIST is working to improve security and privacy of electronic medical records and devices.
Cybersecurity National Action Plan: Some ideas are bold, some old
Cybersecurity has a high profile in the president’s agenda for his final year. There are some good ideas in his Cybersecurity National Action Plan, but whether they translate into improved security will depend on Congress and the next president.
Protecting Sensitive Government Info on Contractor Networks
The Defense Department has given contractors two years to meet new requirements for securing sensitive DOD data on nonfederal IT systems, responding to industry concerns over moving too quickly to the new standards.
GPS III to boost accuracy, security
The Air Force is on track to deliver in August 2016 the first of a series of advanced GPS satellites that promise to vastly improve the accuracy, reliability and security of the global positioning system constellation used by the military and civilian users, according to Air Force Col Steven Whitney, director of the Global Positioning … Continue reading GPS III to boost accuracy, security