Quantcast
Channel: information security – Techsource
Browsing all 25 articles
Browse latest View live

Grooming the Next Generation of Cybersecurity Professionals

The growing number of cybersecurity threats is becoming a daily occurrence that organizations must prepare for. Hacktivist groups like Anonymous and LulzSec have made it a game to point out, in a very...

View Article


Image may be NSFW.
Clik here to view.

RSA Conference 2012: Inside the Event

By Daniel Nowak, Lead Security Architect I spent late last month in the San Francisco Bay area imbibing the energy of the original Sin city—the energy, the Golden Gate, the flavorful culture, the Blue...

View Article


Image may be NSFW.
Clik here to view.

Shooting phish in a barrel: Attacks grow among government agencies

Could it be as easy as shooting phish in a barrel? We’ve seen a number of threats against government agencies this past year, many of which have been targeted by organizations looking to prove a point....

View Article

Image may be NSFW.
Clik here to view.

Executive Chef: Howard Schmidt Resignation Points to a Larger Issue in the...

Something that many people within the information security community rarely give thought to is how difficult and arduous the path to becoming “Chef” really is. It is not a role as defined by you or me,...

View Article

Image may be NSFW.
Clik here to view.

Study: Federal Government Failing at Mobility

The federal government is laser-focused on mobility. In fact, federal CIO, Steven VanRoekel, recently announced a comprehensive digital government strategy that details ways in which the government and...

View Article


Image may be NSFW.
Clik here to view.

The Graying of Black Hat, DEFCON and InfoSec Industry

This past week was easily one of the most compact and dense information security experiences to be had within the continental U.S. Inside of a short five days, a large chunk of the world’s active...

View Article

PODCAST: Lisa Dezzutti, CEO and President of Market Connections, Discusses...

With uncertain budgetary times looming ahead, many government contractors are dealing with new realities. Where once was year-over-year organic growth, now contractors need to seek new revenue streams...

View Article

PODCAST: Daniel Nowak, Principal Security Architect, Iron Bow, Discusses Key...

This month we will be featuring a series of interviews with various subject matter experts on future trends in the areas of cybersecurity, virtualization, cloud, mobility and collaboration. Today we...

View Article


Image may be NSFW.
Clik here to view.

McAfee’s Ken Kartsen Discusses the Security Challenges Impacting the Adoption...

Data is the modern paper. Where once we produced reams of paper that needed to be stored, we now generate terabytes of data that need to be managed, stored, shared and, most importantly, secured. These...

View Article


The Changing Face of InfoSec

Having wanted to attend Jeff Carr’s Suits and Spooks (SNS) event for a number of years, life offered me a touch of luck since his latest event landed in Arlington, VA – just a quick jaunt from our Iron...

View Article

Image may be NSFW.
Clik here to view.

Effective Security Strategy Requires a Lifecycle Approach

A traditional IT security model typically requires a defense-in-depth strategy. Organizations believe that if they put in enough layers of security boxes, they can deter or catch the bad guys and keep...

View Article

Best of Security in 2013

It’s hard to believe that 2013 is already coming to a close. Before we head into 2014, we want to take a moment and reflect on some of our most read content on TechSource this year. The first in this...

View Article

CryptoLocker, Heartbleed and the Next Cybersecurity Threat

Although new security threats and vulnerabilities are constantly being discovered, three major security issues were recently exposed that can threaten virtually every citizen and corporation. The first...

View Article


Image may be NSFW.
Clik here to view.

The Benefits and Considerations of Big Data Implementations

With the proliferation of devices and sensors that generate data, today’s federal government agencies are faced with the difficult task of storing, managing and sharing a mountain of data and...

View Article

Is the Government Ready for FedRAMP Ready?

To ensure that the cloud solutions and services being implemented by government agencies are secure and meet an established set of standards, experts from multiple federal agencies, including GSA,...

View Article


Image may be NSFW.
Clik here to view.

The Graying of Black Hat, DEFCON and InfoSec Industry

This past week was easily one of the most compact and dense information security experiences to be had within the continental U.S. Inside of a short five days, a large chunk of the world’s active...

View Article

PODCAST: Lisa Dezzutti, CEO and President of Market Connections, Discusses...

With uncertain budgetary times looming ahead, many government contractors are dealing with new realities. Where once was year-over-year organic growth, now contractors need to seek new revenue streams...

View Article


PODCAST: Daniel Nowak, Principal Security Architect, Iron Bow, Discusses Key...

This month we will be featuring a series of interviews with various subject matter experts on future trends in the areas of cybersecurity, virtualization, cloud, mobility and collaboration. Today we...

View Article

Image may be NSFW.
Clik here to view.

McAfee’s Ken Kartsen Discusses the Security Challenges Impacting the Adoption...

Data is the modern paper. Where once we produced reams of paper that needed to be stored, we now generate terabytes of data that need to be managed, stored, shared and, most importantly, secured. These...

View Article

The Changing Face of InfoSec

Having wanted to attend Jeff Carr’s Suits and Spooks (SNS) event for a number of years, life offered me a touch of luck since his latest event landed in Arlington, VA – just a quick jaunt from our Iron...

View Article
Browsing all 25 articles
Browse latest View live