The Cyber Kill Chain Approach to Security The territory is not real but virtual, and its guardians use software instead of weapons. Nevertheless the security model is the psame—intrusion detection along the kill chain. The Kill Chain is a security framework that’s been successfully practiced by the military for years and is now finding its […]
Hi all, I wish you all a Happy New Year full of good news! And to start it off, check out this article about the best professions in America. Information/IT Security is well ranked, and paying good money too!
Today’s technology professionals are under a type of pressure that did not exist 10-to-20 years ago. As technology has improved, so have the threats that can be used against it. These threats can come in the form of security compromises, employees not following protocol, data breaches, lost or damaged data, and much more. Pages: 1 […]
Hello everyone and welcome to the blog! Information Security is cool. We all know that. But… As most of you know, I’ve been in the market for 16 years now… which gave me the opportunity to meet the brightest security professionals around the globe, and also some who weren’t the sharpest tool in the shed. […]
A VPN (virtual private network) by definition is a secure way for people in a business to share information through a public network such as the internet. This is what many businesses use to secure their data. This is a great idea because throughout a business there’s tons of sensitive information being sent through the […]
Whether you are freelancer in the information security sector trying to convince a company to hire you, or you are struggling with an employer to justify the annual information security budget, explaining the importance and value of what you do is a hurdle most people in the industry face. While those in the infosec industry […]