877.791.9571 |

About the Author:

A Canadian currently based in Ontario, Canada, Ian is a researcher for InfoSec Institute. Over the years, he has written for a number of IT-related sites such as Linux.com, ITManagersJournal.com and ITBusiness.ca.
QVM_Screen-08272013

IBM rolls out new solution to help companies identify, predict security risks

When Big Blue recently announced the release of a solution that promises to help organizations identify key vulnerabilities in real-time and to reduce total cost of security operations, IS […]

MSPAlliance-07242013

MSPAlliance Discusses Recently Announced Cloud Guidelines and What Lies Ahead for Organization

The International Association of Cloud & Managed Services Providers (MSPAlliance) recently announced guidelines intended to give businesses the tools they need to make smart and informed decisions about how […]

Rapid7_logo-06212013

How to become a software developer

Mike Riley has been a software developer in some capacity or other for decades.

Currently responsible for IT duties at a medium-sized business in Chicago, Illinois that focuses on educational […]

scotiabank-feature

Fortune 500 Interview: Scotiabank’s Greg Thompson talks hackers, cyber terrorists, hacktivists and more

Greg Thompson has his work cut out for him as <a href=”http://www.scotiabank.com/gls/en/index.html#about”>Scotiabank</a>’s highest level security professional. Thompson, vice president of enterprise security services at the Toronto, Ontario-based entity, oversees […]

Acumin-03052013

InfoSec Institute Interview: Ryan Farmer and Scott West of Acumin

Acumin, an international recruitment specialist, focuses on areas such as information security and risk management, governance and compliance, penetration testing, forensics, and business continuity management.

With information security and risk […]

WilsBellInterview-02282013

InfoSec Institute Interview: Wils Bell – President of SecurityHeadhunter.com

SecurityHeadhunter.com Inc., a central Florida-based security search firm, is focused on uniting the right candidates with the right companies in the information security space.

As a specialist in security recruiting, […]

Aiello-interview-sized

Interview: CEO Mark Aiello of The Revolution Group

secureRevGroup, a Wakefield, Massachusetts-based information security professional services firm, started in 2009 as a division of The Revolution Group. InfoSec Institute recently spoke to Mark P. Aiello, CEO of […]

Lara_Dodo-sized

Lara Dodo, Regional Vice President, Ontario, Manitoba and Quebec, Robert Half Technology

Robert Half Technology is ideally positioned to provide customers with a wide range of technology staffing solutions for their project, contract-to-hire and full-time staffing needs. InfoSec recently interviewed Lara […]

ESGI-sized

ESGI Q&A

ESGI Q&A

ESGI, a 12-person retained executive search firm situated in Washington, DC, specializes in senior-level executive searches for companies that sell products and services to the federal, state and […]

120312_2313_TracyLenzne1-sized

Tracy Lenzner, founder and CEO of LenznerGroup

Focusing on the enterprise security, cyber risk and technology innovation spaces, http://www.lenznergroup.com/ is an executive search firm based in Williamsville, New York. Founded back in 1997, the company has […]

security analyst

How to Become a Security Analyst

A degree in something like computer science and certifications such as CISSP and CompTIA Network+ wouldn’t be out of place on the resumes of security analysts.

But Jesse McKenna, a […]

executive_search_4-1024x398

Interview: Joyce Brocaglia, Alta CEO

Joyce Brocaglia is the president and chief executive officer of Alta Associates, a Flemington, New Jersey-based executive recruitment firm. Founded in 1986, Alta focuses on the IT risk management, […]

hr20

IT Recruiter Interview: John Maughan and Chris Currie from ITHR

Information Technology is the engine room of the modern business, according to recruitment consultancy ITHR (IT Human Resources) in London, England.

If that statement holds true, then it wouldn’t be […]

wrightson0071760946

Interview: Author Tyler Wrightson

Tyler Wrightson, CISSP, CCSP, CCNA, CCDA, MCSE, is the author of Wireless Security: A Beginner’s Guide (McGraw-Hill; 2012), the founder and president of Leet Systems, a next-generation security service […]

Computer network diagram.

How to become a network security engineer

,

Jim MacLeod’s journey towards becoming a network security engineer wasn’t typical.

For one thing, he earned a Religion degree at Swarthmore College in Pennsylvania whereas conventional wisdom might have led […]

cert-splash

Which Security Certification Should I Get?

, , , , ,

When it comes to deciding what security certifications to pursue, IT professionals should understand that they will be better off career-wise if they ask—and then answer—the right questions before […]

Measuring the ROI of Security Training

,

Marc Winner hasn’t come up with a way to precisely measure the return on investment for security training. What he does know for certain, however, is that the $100,000 […]

Confident KillSwitch Helps Combat Brute-Force Attacks

Introduction
Confident Technologies Inc.’s (CTI) KillSwitch collects data on hacking attempts to help information security (IS) professionals safeguard their companies’ online properties and mobile applications against brute-force attacks that occur […]