Best small to midsized cities to land a cybersecurity job

Looking for a change of scenery in 2017? Image by ThinkstockWhile cybersecurity positions are plentiful in most major cities, thousands of cyber positions at all levels are waiting to be filled in less populated and often more scenic locales – and most offer a lower cost of living.Although larger corporations usually post the most job openings, “you’re most likely to find that you’re working at a smaller company” in these smaller cities, says Tim Herbert, senior vice president of research and market intelligence at CompTIA, the Computing Technology Industry Association. But the tradeoff will be broader responsibilities and more experience, he adds. “In smaller companies you take on more responsibilities with less specialization than in a large enterprise where roles are very well-defined.”To read this article in full or to leave a comment, please click here

3 ingredients of a successful attack

The field of computer security has been around since the 1960s, and since then, practitioners have developed "a good understanding of the threat and how to manage it," say the authors of Security in Computing, 5th edition.But over the years the field has also developed a language of its own, which can present a challenge to newcomers.In the preface to the updated edition of this classic text, the authors make plain their intent to demystify the language of computer security. One good place to start: understanding the three things a malicious attacker needs to be successful.To read this article in full or to leave a comment, please click here(Insider Story)

ACM Prize in Computing is the new name of honor for young innovators

The Association for Computing Machinery has changed the name of its annual award recognizing computing professionals for early-to-mid-career innovations from the ACM-Infosys Foundation Award to the ACM Prize in Computing, and boosted the value of the prize by $75K.Good call on the name change, which the ACM figures will raise awareness of the award and be more recognizable. Though not to be confused: the group's more famous AM Turing Award, given annually for major contributions of lasting importance to computing, is known informally as the "Nobel Prize of Computing". (See also: "Crypto dream team of Diffiie & Hellman wins 2016 'Nobel Prize of Computing'")To read this article in full or to leave a comment, please click here

The One Car

Imagine, for a moment, that you could only have one car. To do everything. No, I don’t mean, “I have access to a moving van through a mover, so I only need a minivan,” I mean one car. Folks who run grocery stores would need to use the same car to stock the shelves as their employees use to shuffle kids to school and back. The only thing about this car is this—it has the ability to add knobs pretty easily. If you need a new feature to meet your needs, you can go to the vendor and ask them to add it—there is an entire process, and it’s likely that the feature will be added at some point.

How does this change the world in which we live? Would it improve efficiency, or decrease it? Would it decrease operational costs (opex) or increase it? And, perhaps, another interesting question: what would this one car look like?

I’m guessing it would look a lot like routers and switches today. A handful of models, with lots of knobs, a complex CLI, and an in depth set of troubleshooting tools to match.

culture-eats-technologyOf course, we actually have many different routers in the Continue reading

Virtual reality Black Friday 2016 deals spill from HTC, Microsoft

With virtual reality systems like HTC Vive, Oculus Rift and PlayStation VR being the latest cool gaming gear around, it's not surprising that consumers haven't been offered a ton of Black Friday 2016 bargains. But some deals have started to trickle out.HTC itself has announced Black Friday and Cyber Monday promotions, offering $100 off Vive hardware platforms, which usually start at $800. HTC Vive provides an immersive full-room VR experience, as you don goggles and hold a couple of controllers to navigate your way undersea, through space or through other worlds.MORE: 50+ Black Friday 2016 tech dealsTo read this article in full or to leave a comment, please click here

Diving Into Buhtrap Banking Trojan Activity

Cyphort recently published an article about the Buhtrap banking trojan [https://www.cyphort.com/banking-malware-buhtrap-caught-action/], targeting users of Russian and Ukrainian banks as reported in March of 2016 by Group-IB [http://www.group-ib.com/brochures/gib-buhtrap-report.pdf]. Cyphort’s insightful article analyzes the compromise chain from the website eurolab[.]ua, directing users via an apparently injected HTML script src attribute to rozhlas[.]site which served exploit code for […]

Diving Into Buhtrap Banking Trojan Activity

Cyphort recently published an article about the Buhtrap banking trojan [https://www.cyphort.com/banking-malware-buhtrap-caught-action/], targeting users of Russian and Ukrainian banks as reported in March of 2016 by Group-IB [http://www.group-ib.com/brochures/gib-buhtrap-report.pdf]. Cyphort’s insightful article analyzes the compromise chain from the website eurolab[.]ua, directing users via an apparently injected HTML […]

FireEye’s iSIGHT threat intelligence exposes security blind spots

What separates a great Major League Baseball hitter like David Ortiz from some run-of-the mill player? Great eyesight and intelligence. Ortiz sees more than others and takes all of the rich information he sees to make an intelligent, actionable decision to swing a baseball or not. While lots of players claim to do this, only a few have the right combination of the two to separate themselves from the field. The same thing can be said for IT security. It takes visibility across the entire attack spectrum, plus analytics and real-world insight, to provide actionable threat intelligence. Many vendors claim to have threat intelligence, but they operate by looking for anomalies in the network to flag something that might be a breach. This can be valuable, but it addresses only part of the security continuum. To read this article in full or to leave a comment, please click here

FireEye’s iSIGHT threat intelligence exposes security blind spots

What separates a great Major League Baseball hitter like David Ortiz from some run-of-the mill player? Great eyesight and intelligence. Ortiz sees more than others and takes all of the rich information he sees to make an intelligent, actionable decision to swing a baseball or not. While lots of players claim to do this, only a few have the right combination of the two to separate themselves from the field. The same thing can be said for IT security. It takes visibility across the entire attack spectrum, plus analytics and real-world insight, to provide actionable threat intelligence. Many vendors claim to have threat intelligence, but they operate by looking for anomalies in the network to flag something that might be a breach. This can be valuable, but it addresses only part of the security continuum. To read this article in full or to leave a comment, please click here

CIO confab SIMposium to skip 2017, return in 2018 as SIM Connect Live

The Society for Information Management has announced that is reworking its annual SIMposium conference, which took place last month in Connecticut, and will come back in the spring of 2018 with an event dubbed SIM Connect Live. This year's event attracted just under 800 CIOs and other IT decision makers and business strategists to exchange thoughts on everything from leadership to risk management to the workforce of the future (See also: "CIO Security Lessons -- Dark thinking on IoT & exploding enterprise networks").To read this article in full or to leave a comment, please click here

CIO confab SIMposium to skip 2017

The Society for Information Management has announced that is reworking its annual SIMposium conference, which took place last month in Connecticut, and will come back in the spring of 2018 with an event dubbed SIM Connect Live.This year's event attracted hundreds of CIOs and other IT decision makers and business strategists to exchange thoughts on everything from leadership to risk management to the workforce of the future (See also: "CIO Security Lessons -- Dark thinking on IoT & exploding enterprise networks").To read this article in full or to leave a comment, please click here

CIO confab SIMposium to skip 2017

The Society for Information Management has announced that is reworking its annual SIMposium conference, which took place last month in Connecticut, and will come back in the spring of 2018 with an event dubbed SIM Connect Live.This year's event attracted hundreds of CIOs and other IT decision makers and business strategists to exchange thoughts on everything from leadership to risk management to the workforce of the future (See also: "CIO Security Lessons -- Dark thinking on IoT & exploding enterprise networks").To read this article in full or to leave a comment, please click here

In tech recruiting, playing it safe is risky business

The Silicon Valley version of the American Dream goes something like this: a dishwasher, a bike messenger, an actor, a waiter (insert totally-unrelated-to-technology job title here) leverages his or her hobbyist-level coding skills to land a hot programming job and becomes a "rockstar developer."And nearly everyone who works in tech, from CEOs, venture capitalists, startup founders, and programmers themselves will tell you they don't care what a candidate's background is; where they went to school; what gender, race, ethnicity they are. All that matters is their tech chops and whether they can do the job. That's terrific, in the hypothetical.In practice, however, is where this dream breaks down; the HR professionals, hiring managers and tech recruiters who are on the front lines of hiring do care about those qualifications, to the detriment of both candidates and companies, says Harj Taggar, co-founder and CEO of technical hiring platform Triplebyte.To read this article in full or to leave a comment, please click here