Access "Information assurance training programs create new cadre of IT security pros"
Recognizing that individuals proficient in computer security are in high demand, colleges and universities have begun producing students with degrees in information assurance. When compared with other disciplines that have been in existence for 150 or more years at the institution, information assurance training programs are seen as the “new kids” on the academic block. The first schools to teach security courses began doing so in the 1990s, and they started offering degree programs in 2000. At approximately the same time, 1999, the government, specifically the National Security Agency, created the Centers of Academic Excellence (CAE) program as a way to entice a larger number of universities to produce security professionals. In 2000, seven schools met the government’s criteria and were designated as charter CAE schools; Iowa State University was one of the original seven. Since that time the number of CAE schools has grown to more than 150 schools that range from two-year colleges to research-focused institutions. Due to the diversity of topics and ... Access >>>
Premium Content for Free.
The Huawei security risk: Factors to consider before buying Chinese IT
by Joel Snyder, Contributor
Cover story: The U.S. government says Chinese IT giants Huawei and ZTE pose too much risk. But do they? Joel Snyder offers his take.
BYOD security strategies: Balancing BYOD risks and rewards
by Lisa Phifer, Contributor
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies.
- The Huawei security risk: Factors to consider before buying Chinese IT by Joel Snyder, Contributor
IT Security Trends 2013: Mobile security concerns tops the list
by Robert Richardson
- IT Security Trends 2013: Mobile security concerns tops the list by Robert Richardson
Offensive security involves proactive deception tactics
by Robert Westervelt
Going on the offense doesn’t mean actively targeting cybercriminals, experts say. Deceptive tactics, phony documents can help trip up attackers.
- Offensive security involves proactive deception tactics by Robert Westervelt
2013 Security Priority Survey, security risks when buying IT hardware from China
by Robert Richardson, Editorial Director
Information Security Magazine reveals the results of its 2013 Security Priority Survey and examines the security risks associated with purchasing IT hardware from China. Elsewhere in the issue, infosec pros share their strategies for BYOD security.
Information assurance training programs create new cadre of IT security pros
by Doug Jacobson and Julie A. Rursch
University information assurance programs are varied, but they are beginning to provide technology disciplines a level of security knowledge.
Testing, assessment methods offer third-party software security assurance
by Gary McGraw, Contributor
No ultimate test can give third-party software a clean bill of health, but careful assessment can help organizations gain more control over vendors.
- 2013 Security Priority Survey, security risks when buying IT hardware from China by Robert Richardson, Editorial Director
More Premium Content Accessible For Free
Devising a security strategy for the modern network
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
The big data challenge: What's in store for NoSQL security
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
A comprehensive guide to securing the Internet of Things
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...