Resource: Optimize Your Network for the Microsoft Cloud Course from MVA
Get up to speed on how the Microsoft Cloud can improve your own network.
read more Continue reading Resource: Optimize Your Network for the Microsoft Cloud Course from MVA
Collaborate Disseminate
Get up to speed on how the Microsoft Cloud can improve your own network.
read more Continue reading Resource: Optimize Your Network for the Microsoft Cloud Course from MVA
With millions of small businesses out there, why don’t they care about cyber security? You may be reading this and own a small business or know someone that does. Think to yourself: why would small businesses not care about cyber security? You may find that it is not a problem of caring but a problem […]… Read More
The post Why Small Businesses Don’t Care About Cyber Security appeared first on The State of Security.
Continue reading Why Small Businesses Don’t Care About Cyber Security
Just about everything the US Government publishes is available to the public. Granted, browsing the GPO bookstore yields a lot of highly specialized documents like a book on how to perform pediatric surgery in hostile environments. However, there are some gems if you know where to look. If you ever wanted to have a comprehensive electronics course, the US Navy’s NEETS (Navy Electricity and Electronics Training Series) is freely available and has 24 modules that cover everything from electron flow through conductors, to tubes, to transistors and integrated circuits.
There are many places you can download these in one form …read more
Continue reading NEETS: Electronics Education Courtesy of the US Navy
As we head into summer, we wanted to let everyone know that for 2017 we only have two remaining public offerings of our highly popular and newly updated Malware and Memory Forensics training course. If you would like to join us, our international cours… Continue reading Our Newly Updated Memory Forensics and Malware Analysis Course is Headed to Herndon and London!
One of the most exciting aspects of working in technology is change, and security in particular requires an agile mind. People who are capable of rapidly acquiring knowledge and developing new skills – the proverbial ‘quick studies’ – fare best in this landscape. So what’s the best way to learn and grow? Successful on-the-job learning […]… Read More
The post Which Cybersecurity Skills Training Medium Is Best? Instructor-Led Training as King appeared first on The State of Security.
Continue reading Which Cybersecurity Skills Training Medium Is Best? Instructor-Led Training as King
One of the most exciting aspects of working in technology is change, and security in particular requires an agile mind. People who are capable of rapidly acquiring knowledge and developing new skills – the proverbial ‘quick studies’ – fare best in this landscape. So what’s the best way to learn and grow? Successful on-the-job learning […]… Read More
The post Which Cybersecurity Skills Training Medium Is Best? Instructor-Led Training as King appeared first on The State of Security.
Continue reading Which Cybersecurity Skills Training Medium Is Best? Instructor-Led Training as King
What is Robotics Process Automation (RPA) and why should internal auditors care about it? RPA is software that imitates human interaction with computer systems to accomplish tasks. RPA can log into multiple systems, navigate through user interfaces or command line functions … Continue reading →
Continue reading Why Internal Auditors Should Care about Robotic Process Automation
Federal agencies pay an average of $7,000 a year less to cybersecurity personnel than their private sector counterparts, so they need to offer training and other benefits while recruiting more from overlooked groups like women and minorities, according to one of the largest regular surveys of information security workers. The eighth biannual Global Information Security Workforce Study, done by the Center for Cyber Safety and Education and sponsored by contracting giant Booz Allen Hamilton, cyber recruiters Alta Associates and the International Information Systems Security Certification Consortium or (ISC)², was unveiled Tuesday at (ISC)²’s conference CyberSecureGov in Washington, D.C. The U.S. government “must enhance its benefits … to attract future hires and retain existing personnel given its fierce competition with the private sector for skilled workers and the unprecedented demand,” said Dan Waddell, (ISC)² managing director, North America. “Unfortunately,” he added, “the layers of complexity involved in fulfilling that goal are significant.” “Thanks to the record-number of federal GISWS […]
The post (ISC)² survey: To recruit cyber talent, feds must make up in training, benefits, what jobs lack in pay appeared first on Cyberscoop.
When internal auditors (or those pretending to be such) do poor work and don’t follow the appropriate audit and IT standards, they are unprofessional. However, I put the blame at the feed of audit management. This post is a result … Continue reading →
Continue reading Audit Management Sometimes Sucks
Identity theft is a type of fraud that’s directed squarely against individuals, but to believe that businesses don’t suffer any consequences or costs associated with it is simply wrong. Identity theft effects According to a recent survey about the aftermath of identity theft by the Identity Theft Resource Center, over half of the victims of identity theft that resulted in tax fraud had to borrow money from family and friends, and nearly half were were … More → Continue reading Why businesses should care about identity theft