ICT Security
32 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Richard Smith
Scoop.it!

The Future of Information Security

The Future of Information Security | ICT  Security | Scoop.it

CISOs and security leaders share their views on how the landscape is changing.

more...
No comment yet.
Scooped by Richard Smith
Scoop.it!

IBM X-Force: Ahead of the Threat

IBM X-Force: Ahead of the Threat | ICT  Security | Scoop.it

The IBM X-Force Research and Development team analyzes trends in attack behaviors across platforms and industries. The IBM X-Force Threat Intelligence Quarterly highlights their findings and provides insights into the most significant threats and challenges that security professionals face today in a compact, quarterly format.

more...
No comment yet.
Scooped by Richard Smith
Scoop.it!

Translating 'Consultantspeak,' the Taxonomy of Security Consulting Services

Richard Smith's insight:

As IT security risks increase, the demand for skilled IT contractors and consultants will scale with it.  

This article provides a translation of the terms often used by organisations specializing in mitigating risk  and damages. 

more...
No comment yet.
Scooped by Richard Smith
Scoop.it!

Flying hacker contraption hunts other drones, turns them into zombies

Flying hacker contraption hunts other drones, turns them into zombies | ICT  Security | Scoop.it

"Serial hacker Samy Kamkar has released all the hardware and software specifications that hobbyists need to build an aerial drone that seeks out other drones in the air, hacks them, and turns them into a conscripted army of unmanned vehicles under the attacker's control."

Richard Smith's insight:

I think this is interesting because it shows as technology advances, security professionals will have to defend against all manner of unconventional situations. 

more...
No comment yet.
Rescooped by Richard Smith from Certified Ethical Hacking
Scoop.it!

Ethical hacking as a career

Ethical hacking as a career | ICT  Security | Scoop.it
George Jason, vice-president, Comguard Networks, in an interview to Diptiman Dewan elaborates on ethical hacking as a rapidly growing career option. Ethical hacking, also known as penetration...

Via SIDDUabadboy
Richard Smith's insight:

There  is a staggering rate of growth in the information security field, one aspect of which is the penetration tester or ethical hacker.

more...
No comment yet.
Scooped by Richard Smith
Scoop.it!

Long-Range Planning Guidance for Information Security and Risk Management: Gartner's Security 2020 Scenario

Gartner introduces a completely new lens to view security and risk management practices. As part of a 2013 special report, business and technology leaders will be able to better assess and perform long-term strategic planning to deflect impending threats and reveal new opportunities through 2020.

more...
No comment yet.
Scooped by Richard Smith
Scoop.it!

SANS Institute - Top 20 Critical Security Controls

SANS Institute - Top 20 Critical Security Controls | ICT  Security | Scoop.it

The Critical Security Controls focuses first on prioritizing security functions that are effective against the latest Advanced Targeted Threats, with a strong emphasis on "What Works" - security controls where products, processes, architectures and services are in use that have demonstrated real world effectiveness.

  

Richard Smith's insight:

A look at the practices of IT Security.

As more measures are taken, finding a balance between security and availability is becoming paramount.

more...
No comment yet.