Issue highlights 1. The CSO Security Career Survival Guide 2. 5 keys to hiring security talent 3. IDG Contributor Network: Cyber what? (part 2 of 2) 4. Big data collection makes it hard for you to remain anonymous |
Resource compliments of: Akamai Ponemon Institute surveyed over 600 individuals involved in preventing, detecting and containing denial-of-service attacks against organizations. Brining together responses and analysis, Ponemon Institute identified key stats and trends in cybersecurity that enterprise organizations should be aware of. Read the full white paper Ponemon Institute: The Cost of Denial-of-Service Attacks and discover important facts including the cost of a DDoS attack and effective technologies for protection and mitigation. |
CSO's Security Career Survival Guide READ MORE |
Resource compliments of: DEMO Traction Attend DEMO Traction 2015 to see 40 fast-growing startups. See live demos of cutting-edge products for sales, marketing, engineering, IT, operations, logistics, finance and HR. Nonstop tech exploration for innovators, entrepreneurs, IT pros and business leaders. One-day event. Limited-time savings. Register now. |
Recruiting IT security professionals can be tough, unless you have a great elevator pitch. The CSO of an insurance company provides advice on telling job candidates a compelling story. READ MORE |
White Paper: Fortinet Secure Email Gateways and sandbox tools are a powerful combination, and indeed perfect partners, in combating in Advanced Persistent Threats (APTs). This solution brief explains the 3 reasons why these tools are the right team to combat APTs. View Now>> |
Words beginning with "cyber," such as "cyber war" and "cyberspace" are entering our everyday lexicon. Politicians use the terms to describe an ambiguous threat from another country and security vendors use the terms to get you to buy their services. What exactly is cyberspace? Is cyber warfare and cyber terrorism real, and if so, are there real-world examples? These questions, and more, are tackled in this two-part series. READ MORE |
One of the challenges of Big Data collection is maintaining personal privacy. One way to do that is with 'de-identification' - eliminating personally identifiable information. It can be done effectively if those doing the collection use rigorous methods. But experts say that is a very big 'if'. READ MORE |
White Paper: Fortinet In 2015 we expect to see cyber criminals, fueled by the success of many high profile hacks, continue to innovate with an even greater focus on deceiving and evading existing security solutions. View Now>> |
|
0 comments:
Post a Comment