No comfort zone.
Infoworld was running an article on "How great IT security leaders succeed". I said earlier that it's a question of attitude, and I find myself confirmed, time and again. But Infoworld has also this to...
View ArticleHire Hackers?
Information Week is running an article by Matthew Schwartz on whether one Should [...] Hire A Convicted Hacker. They quote the case of Kevin Mitnick and cite a tendency that, silently, people who have...
View ArticleENISA issues position paper on certification
ENISA, the European Network and Information Security Agency just issued a paper on security certification: Information Security Certifications - A Primer: Products, people, processes. This whitepaper...
View ArticleTheory of social closure predicts: Profession will close ranks
Max Weber, the renowned sociologists, described social closure as the tendency of groups to restrict entry to outsiders in order to maximize their own benefit. I was reminded of this when I read an...
View ArticleIt will remain hard to find good IT Security skills
It was in the news (and on Network World): CompTIA recently published a survey on the security skills of IT workers. In an impressive list of numbers we learn that the gap between demand and supply is...
View ArticleWhy passwords are easy to guess
Kristian Köhntopp writes in his blog (original text in German, quoted and translated with permission): (Translation begins) Fun Passwords Some entertaining fun password statistics from a client. Using...
View ArticleSome security tools carry their own risks
It sounds like a tempting idea: Put security tools online so everybody can use them without installing software. Such as Virus Checking for documents (1, 2) or checking the quality of passwords (1, 2)....
View ArticleIT Security people are networking-crazy
I recently got bitten by the networking virus. By now, the infection is in full swing. I am a member of four real-world associations, including, amongst others, (ISC)² and ISACA. Of course these offer...
View ArticleSecurity Skills (and such)
The new year has begun and everybody has had their go at crystal-balling on the new year.Joyce Brocaglia is writing on "The Most-Wanted Security Skills of 2007 (and Beyond)" over at CSO. According to...
View ArticleSpinning the hog cycle
Infosecurity Today is quoting SANS as saying that "Infosecurity professionals will see improved job opportunities in 2008" (...) "as senior executives in government realise that their systems have...
View ArticleHow to Win Friends and Get Hired as a Security Pro
I think SC Magazine must have been the first to take notice... (ISC)² has published its reference guide for HR Professionals.Now, it has been said for some time that some folks - inside and outside the...
View ArticleMoney, Money, Money
A reader was writing the following letter (slightly edited to protect the guilty):Our annual reviews are coming up this month, and I've been doing some homework: I've looked at the U.S. Dept. of Labor...
View Article"Job at global IT Company"
A recruiter contacted me yesterday via LinkedIn. Strangely, the name of the sender didn't match the person who claimed to sign the e-mail. After some back and fro, I received the following e-mail...
View ArticleIndulgence
Right. I've been waiting to be able to write about this... Leesa Fogarty was writing on Information Technology Security Link on "Marketing yourself as a luxury brand". Nice metaphor. Very original...
View ArticleThe splinter in your brother's eye
Scientists at the University of Leeds recently published a report on risk perception ("Workplace autopilot threatens security risk perception"). Based upon a (relatively small) sample, researchers...
View ArticleHow to get hired as a CSO
CSO Magazine recently published an article by Jeff Snyder on "The Top Five Reasons CSO Candidates Don't Get Hired" Rather surprisingly, the top of the list, according to the author who is head of a...
View ArticlePrepare for the pink slip!
Actually, that's not what I meant. But let me start from the start. Lifehacker is a productivity blog. They recently published an article titled "Prepare for a Layoff". What they're basically saying is...
View ArticleRisk compensation
It's a well-known fact in traffic psychology that people react to new safety measures in a quite paradoxical way: They assume more risky behavior. In a nutshell, the introduction of helmets, safety...
View ArticleNo comfort zone.
Infoworld was running an article on "How great IT security leaders succeed". I said earlier that it's a question of attitude, and I find myself confirmed, time and again. But Infoworld has also this to...
View ArticleHire Hackers?
Information Week is running an article by Matthew Schwartz on whether one Should [...] Hire A Convicted Hacker. They quote the case of Kevin Mitnick and cite a tendency that, silently, people who have...
View Article