Cyber Security

Governor McAuliffe recently announced a new strategic relationship between Amazon Web Services (AWS) and the Virginia Cyber Range that will expand the reach of the initiative and help make Virginia a national resource for cybersecurity education. AWS will join the Commonwealth of Virginia and Virginia Tech to support scalable cloud infrastructure and collaborate on cybersecurity educational […]

by

A large hole outside the RSA security conference in San Francisco. There were record numbers of people, exhibitors, talks and awards at the recent RSA Security show in San Francisco. Yet we have widening security holes in enterprise systems that continue to be discovered and exploited. You could buy every product and service at the […]

by

Looking to get ahead in cybersecurity? Here are four areas to keep in mind as you make a five-year career plan. The economics of supply and demand shape today’s cybersecurity job market. Each year, US employers post more than 120,000 openings for information security analysts and roughly one-third go unfilled. Hiring managers are bracing for […]

by

A Lot of Disagreement Two weeks ago, SA published an article of mine entitled, “The Gloves Are Off – Investing In (Contested) Campaign Promises.” In that piece, I argued that investors would be well advised to stay ahead of how the president and various stakeholders are interacting while considering whether to reposition their portfolios. There […]

by

Remember that moment when you really committed yourself to solid security and privacy practices? The moment when you committed to never clicking on a link you weren’t sure about, to always checking for badges on people coming in the door, to always using your password manager to create a complex password? If you do, you […]

by

Dan Conde, an analyst at Enterprise Strategy Group in Milford, Mass., said he noticed two different ends of the spectrum regarding cybersecurity policies at last week’s RSA 2017 conference. On one end, Autodesk, a software company, is working to provide security while adopting cloud computing, open source, SaaS and continuous integration-continuous deployment methods. At the […]

by