• How to become a software engineer and information security expert

    I'm a commerce student that wants to become a software engineer and also an information security expert. Where should I start going about this process?

    DEVILG5 pointsBadges:
  • Network security server

    Which o/s would I use with 5000 employees and why?

    Vsmack295 pointsBadges:
  • Security Certifications

    What are credible entry level security certifications? There are so many and Im confused. I am Comptia A+, network+ and MCTS server 2008 certified along with a CIS bachelors

    Flkid5 pointsBadges:
  • ISO 27001 help?

    Hello, I'm a student at UAT and am attempting to find out what would the best way be to implement ISO 27001 framework from the ground up. Has anyone here set it up from nothing, and what recommendations do you have starting this up?

    GasPerez20 pointsBadges:
  • Master thesis subject – an idea?

    Hi all, I am in the last year of my master program in Information Security and I have to find a subject for my master thesis with focus on Information Security. Anyone any idea? Thank you very much,

    Pupincurist25 pointsBadges:
  • Bachelors of Arts in Information Technology

    I need to know with Bachelors of Arts in Information Technology with a concentration in network and information security, would I be able to secure a job just as well as a person with a Bachelors of Science in Information Technology?

    Persuing20145 pointsBadges:
  • Information security frameworks

    Would you give me guide lines on developement steps and initial requirements of information security fraemeworks?

    Saidkhalfan5 pointsBadges:
  • Preparing an Assumption Risk Report

    Good Morning, I'm fairly new at my postion as an Information Security Officer (ISO) and I wanted to know how to prepare a letter to the Designated Aproving Authority (DAA) on the "Risk Assuptions" or " "Statement of Residual Risk". There are items on my Plan of Action and Milestone (POA&M) that the...

    Jay249690 pointsBadges:
  • Information Security Awareness

    We are in the early stages of creating an Information Security program for our new company.  I would like to email monthly security tips, tidbits, etc  for Security Awareness to all employees.  Have you seen anything "catchy", grab your attention type email subject lines and/or icons, so we can...

    Toyz5 pointsBadges:
  • Differnce between Information Security and IT security?

    Hello. Can anybody help me knowing the difference between Information Security and IT security?

    Rahul Shrivastava330 pointsBadges:
  • Can a company do an ISO 17799/27001 certification in-house?

    Can a company do an ISO 17799/27001 certification in-house or does it require a third party to come in and do it? what about after that - are recertifications required or can that be done in house with an internal auditor?

    Security Channel ATE15 pointsBadges:
  • Is career change to information security adviseable?

    Hi, I have done my bachelors in computer applications and PG diploma in cyber security back in INDIA. I am working for cognizant technologies but not in the profile of network admin or anything related to networks as i had to take a job whatever came my way to run family but i am very much...

    Port80805 pointsBadges:
  • College For Information Security and Risk Management

    Hi im about to begin my goal in computer information secuirty and risk management....im just curious as to 1) the types of jobs this bachelors would allow me to get 2) what is a starting salary? and 3) what else would you reccomend that i take in the IT Field (school wise) to further excell this...

    O1910 pointsBadges:
  • Can a remote access install LoJack to recover a stolen laptop?

    My laptop got stolen yesterday. It has Windows Vista Ultimate 64-bit. Can a remote access find or install LoJack on it?

    NetworkingATE1,545 pointsBadges:
  • Live Data Security Webinar with Imperva – Today at 2pm EDT (sponsor post)

    Join Imperva CTO, Amichai Shulman as he details the findings from one of the most comprehensive data security studies, which surveyed nearly 1000 security and IT professionals. This webinar provides: Best practices for compliance and data breach preventionAn overview of the most commonly used data...

    EmNichs3,250 pointsBadges:
  • Sponsor Post: Live Data Security Webinar with Imperva – 9.15.2010

    Data Security: The New Paradigm in Info Security Wednesday, September 15, 2010 @ 2:00 pm EDT (New York, GMT-04:00) One major challenge in data security is the lack of awareness into which controls improve security outcomes. Typically, security controls are chosen based on anecdotes, personal...

    ITKE346,430 pointsBadges:
  • Security Testing Types

    What are the different types of Security Testing?

    Somutripathi5 pointsBadges:
  • How to make a career in information security field a long term success

    I want to make a career in information security field. I have already completed my MCSE. What can I do next to ensure I have a long-term successful career in network security?

    NetworkingATE1,545 pointsBadges:
  • How to block a URL on a 2004 ISA Server

    I all ready got to know the way to block the messengers from the link on how to block messengers with ISA-server firewalls. I wanted to know the way to block a particular URL on ISA Server 2004. How can I do that?

    NetworkingATE1,545 pointsBadges:
  • How do you create a Business Case for Security?

    In a nutshell, which would be a good way of putting together a business case for a solution that mitigates security risks, when the "income" generated by the solution is not easy to define?

    DiegoDH275 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following