Access "Well-rounded information security education benefits IT professionals "
This article is part of the March 2013/ Volume 15 / No. 2 issue of Outsourcing security services
Every day we hear about the newest attack, the latest exploit, or another cyber threat. In response, we hire security consultants, look for the best security team we can find, and buy the latest products from the security vendors. Security expertise cannot exist in a silo, however. All employees in your organization need to be security savvy to help reduce risk. But how many of your personnel worry about security on a daily basis? While our credo is that all of your employees are responsible for your company’s security, the IT professionals are—to one degree or another—at the forefront of security issues that arise in your business. How can IT professionals become security savvy? In general, there are three basic tracks to an information security education. Different individuals may choose different paths, either informal or formal. Many times, there’s synergy to be gained when IT staff members participate in multiple types of IT security education. Informal Information Security Education As a whole, IT professionals are bright and inquisitive. Many of your ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Outsourcing security services in the enterprise: Where to begin
by Mike Chapple, Enterprise Compliance
Outsourcing security services doesn’t have to mean moving to the cloud. Enterprises have many options for outsourcing security services, including managed and hosted services.
-
Managing big data privacy concerns: Tactics for proactive enterprises
by Lynn Goodendorf, Contributor
The growing use of big data analytics has created big data privacy concerns, yet viable tactics exist for proactive enterprises to help enterprises get smarter while keeping consumers happy.
-
Outsourcing security services in the enterprise: Where to begin
by Mike Chapple, Enterprise Compliance
-
-
Antivirus evasion techniques show ease in avoiding antivirus detection
by Joe Granneman, Contributor
In the wake of the New York Times attack, a look at antivirus evasion techniques show how easy it is to avoid antivirus detection and why new defenses are needed.
-
Antivirus evasion techniques show ease in avoiding antivirus detection
by Joe Granneman, Contributor
-
Columns
-
Big data creates cloudy security forecast
by Robert Richardson
Security in the cloud has come a long way and it’s now possible to control the quality of security you get in Web deployments, and to monitor what’s going on in your slice of the cloud.
-
Well-rounded information security education benefits IT professionals
by Doug Jacobson and Julie A. Rursch
A security-savvy IT staff can help reduce risk. Learn about information security training and education options for IT professionals.
-
Marcus Ranum: Cloud service-level agreements
by Marcus Ranum
Marcus Ranum, security expert and Information Security magazine columnist, goes one-on-one with Randy Sabett, counsel at ZwillGen PLLC and formerly with the National Security Agency to discuss cloud SLAs.
-
Big data creates cloudy security forecast
by Robert Richardson
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...