IT Security from ZDNet “​Australian government pledges AU$50m for cybersecurity research centre”

​Australian government pledges AU$50m for cybersecurity research centre | ZDNet The seven-year investment will see the launch of a cybersecurity cooperative research centre to deliver solutions that increase the security…

Continue ReadingIT Security from ZDNet “​Australian government pledges AU$50m for cybersecurity research centre”

IT Securityom (ISC)²Are “Women the Answer to the Cybersecurity Skills Gap?”

Are Women the Answer to the Cybersecurity Skills Gap? Information security is one of the most important and fastest growing professions in the world, possessing a near-zero unemployment rate, but…

Continue ReadingIT Securityom (ISC)²Are “Women the Answer to the Cybersecurity Skills Gap?”

IT Security – from Yahoo news “Ex-Homeland Security Chief: Good cyber security is like an immune system”

Ex-Homeland Security Chief: Good cyber security is like an immune system A rash of recent high-profile cyber attacks has security experts scrambling to find solutions. “You cannot have an unrealistic…

Continue ReadingIT Security – from Yahoo news “Ex-Homeland Security Chief: Good cyber security is like an immune system”

IT Security – from gizmodo.com “Passwords to Over a Half Million Car Tracking Devices Leaked Online”

Passwords to Over a Half Million Car Tracking Devices Leaked Online We’ve seen a lot of data breaches this year: some big, some small, some that are dangerous, and some…

Continue ReadingIT Security – from gizmodo.com “Passwords to Over a Half Million Car Tracking Devices Leaked Online”

CISSP certification: Thor Pedersen’s answer to “What is the best method to study for the CISSP?” – Quora

When I did mine I watched videos, read book, re-watched videos and took a full practice test (250 questions), then when I knew my weak areas I read the book…

Continue ReadingCISSP certification: Thor Pedersen’s answer to “What is the best method to study for the CISSP?” – Quora

IT Security – from hackster.io New Backscatter Sensors Operate Over Long Ranges with Very Little Power

New Backscatter Sensors Operate Over Long Ranges with Very Little Power The Holy Grail of connected sensors and devices is to be able to transmit data over long distances without…

Continue ReadingIT Security – from hackster.io New Backscatter Sensors Operate Over Long Ranges with Very Little Power

CISSP certification: Rules, laws and regulations (the Wassenaar Arrangement).

Wassenaar Arrangement – Export/Import controls for Conventional Arms and Dual-Use Goods and Technologies. 41 countries are a part of the arrangement. Cryptography is considered “Dual-Use”. Iran, Iraq, China, Russia and…

Continue ReadingCISSP certification: Rules, laws and regulations (the Wassenaar Arrangement).

IT Security – from Forbes: “Utilities Will Spend Billions On Cybersecurity As Threat Grows”

Utilities Will Spend Billions On Cybersecurity As Threat Grows The electric grid is vital infrastructure, but it looks way too vulnerable to hackers. The National Institute of Standards and Technology…

Continue ReadingIT Security – from Forbes: “Utilities Will Spend Billions On Cybersecurity As Threat Grows”

CISSP certification: Thor Pedersen’s answer to “What is Step For Certified Information Systems Security Professional (CISSP)?” – Quora

#1 Study, #2 pass, #3 eat cake! When I did my certifications I was from a techie background and I did complimenting certificates for that. I already had my CCENT,…

Continue ReadingCISSP certification: Thor Pedersen’s answer to “What is Step For Certified Information Systems Security Professional (CISSP)?” – Quora