Career Opportunities
Gildan Activewear Montreal, Quebec
|
Johnson & Johnson New Brunswick, New Jersey
|
Clackamas Community College Oregon City, Oregon
|
Aerojet Rocketdyne Rancho Cordova, California
|
Embry-Riddle Aeronautical University Prescott, Arizona
|
Ubisec Systems, Inc. Cypress, California
|
Citizens Property Insurance Corporation Jacksonville, Florida
|
KPMG LLP Santa Clara, California
|
National Incident Response Team (NY/NJ) Federal Reserve Bank of New York New York, New York
|
HealthPartners Bloomington, Minnesota
|
Blue Cross Blue Shield Association Chicago, Illinois
|
|
Industry Outlook
By Russ Schafer, Dark ReadingFirewall technology was a game-changing invention when it came out several decades back, and it continues to be an integral part of a company's security system. But with the rollout of IoT, cloud software, mobile devices and more, cybercriminals have an increasing number of entry points for attack. Utilizing a Next Generation Firewall (NGFW) can be an excellent strategy to protect your network and your business.
|
By Bob Violino, CSOAnyone who's been to a job interview knows the stress that comes from answering the interviewer's questions. It's important to sound intelligent and competent, which is difficult to do on the spot - especially when you're nervous. Here, several hiring and security experts weigh in on the subject to provide examples of some challenging questions, as well as some tips on how to answer them effectively.
|
By Dice Staff, DiceIt's common for companies to host forums and competitions to improve their cybersecurity. But it may come as a surprise to know that cybercriminals are doing the same thing, and have been for quite some time. In fact, one recent cybercriminal competition had a cash prize of $15,000, and even a sponsor - a top ransomware gang and producer of one of the most widely-spread malware strains currently circulating. Now, analysis by cybersecurity experts shows that cybercriminals are looking for particular developer skills in their employees, and they have a detailed recruiting and hiring process, just like cybersecurity professionals. Here are some of the most sought-after skills.
|
Upcoming Events
12 February 2020 12 pm (EST) / 11 am (CST) / 9 am (PST) / 17:00 (UTC)
|
27 February 2020 12:00 PM (EST) / 11:00 AM (CST) / 9:00 AM (PST) / 5:00 PM (UTC) |
|
Your ISACA
How will data centers evolve in 2020 and beyond? Marty Puranik shares his perspective in the new ISACA Now #blog. Read it here bit.ly/2uWJ3jk
|
|