The 15 best job markets for IT security specialists

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Dec 21, 2016
Featured Image

Cybersecurity confidence gets a C- . How to improve your grade in 2017

Many security professionals feel less than certain about their own cyber defenses. Research firm CyberEdge Group and Tenable Network Security asked 700 security practitioners in nine countries and across seven industry verticals about their overall confidence that the world’s cyber defenses are meeting expectations. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The 15 best job markets for IT security specialists
There's Still Time! Go Here For Last Minute Deals That Will Ship Fast - Deal Alert
The year ransomware became one of the top threats to enterprises
Cyberattack suspected in Ukraine power outage
Congressional report sides with Apple on encryption debate
Tech companies like Privacy Shield but worry about legal challenges
Census outage marked boom year for global DDoS attacks

White Paper: AVI-SPL

Connecting Collaboration Tech from Multiple Vendors: 5 Experts Share Insights with IT

Many IT and facilities professionals have the technical pieces of their collaboration solution - the room-based video conferencing assets and a UCC solution such as Microsoft Skype for Business or Cisco Spark. What they need now is a way to put the puzzle pieces together. We asked experts from Cisco, Crestron, Biamp, NEC, and AVI-SPL to share their insights and advice for companies trying to create a unified collaborative enterprise. Read More

Thumbnail Image
INSIDER

The 15 best job markets for IT security specialists

Here is a look at the top 15 job markets for information security professionals, according to the recent study, “Where Are the Highest Paying Tech Jobs in the US” from Indeed.com. Read More

Thumbnail Image
DealPost

There's Still Time! Go Here For Last Minute Deals That Will Ship Fast - Deal Alert

Amazon ships fast, so head to their "last minute deals" page and pick yourself some winners right now, before the 2-day shipping window closes for good. Read More

Thumbnail Image

The year ransomware became one of the top threats to enterprises

Ransomware creators are increasingly targeting companies and other organizations, sometimes using techniques borrowed from cyberespionage attacks, because they're likely to pay more money for their data. Read More

Thumbnail Image

Cyberattack suspected in Ukraine power outage

A new power outage that affected parts of Kiev and the surrounding region in Ukraine late Saturday might have been the result of a cyberattack. Read More

Thumbnail Image

Congressional report sides with Apple on encryption debate

The U.S. is better off supporting strong encryption that trying to weaken it, according to a new congressional report that stands at odds with the FBI’s push to install backdoors into tech products. Read More

Thumbnail Image

Tech companies like Privacy Shield but worry about legal challenges

Privacy Shield, the new international framework allowing companies to transfer customer data between the EU and the U.S., is getting good reviews so far, but some companies aren't betting on it for the long term. Read More

Thumbnail Image

Census outage marked boom year for global DDoS attacks

The magnitude of distributed denial of service (DDoS) attacks rose consistently throughout 2016, a report from communications and analysis firm, Neustar has revealed. Read More

White Paper: Dyn Inc

Gartner Report: If External DNS Fails, So Does Your Digital Business

Read this Gartner Research Report and more about: why DNS is mission-critical to all organizations that connect to the Internet, the challenges businesses face maintaining visibility and availability of key resources, and the advantages of an externally sourced, managed, and focused DNS as a service on cost, resilience, reliability, and performance Read More

Top 5 Stories

1. Top 15 security predictions for 2017
2. 14 eyebrow-raising things Google knows about you
3. How to replace 5 major Yahoo services and delete your Yahoo account
4. Hackers get around AI with flooding, poisoning and social engineering
5. 10 new social media scams to watch out for

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.