I need to know with Bachelors of Arts in Information Technology with a concentration in network and information security, would I be able to secure a job just as well as a person with a Bachelors of Science in Information Technology?
Answer Question | March 19, 2012 9:26 AM
bachelors, Degree, Information security, job search skills
We are in the early stages of creating an Information Security program for our new company. I would like to email monthly security tips, tidbits, etc for Security Awareness to all employees. Have you seen anything “catchy”, grab your attention type email subject lines and/or icons, so we can catch people’s attention to these monthly [...]
Answer Question | June 14, 2011 6:43 PM
Information security, IT security, Security, Security Program Management
Hi, I have done my bachelors in computer applications and PG diploma in cyber security back in INDIA. I am working for cognizant technologies but not in the profile of network admin or anything related to networks as i had to take a job whatever came my way to run family but i am very [...]
Answer Question | April 8, 2011 1:37 PM
Career in Information Security, Information security, Information security careers, Network administration, Network administrators
Hi im about to begin my goal in computer information secuirty and risk management….im just curious as to 1) the types of jobs this bachelors would allow me to get 2) what is a starting salary? and 3) what else would you reccomend that i take in the IT Field (school wise) to further excell [...]
Answer Question | October 30, 2010 4:00 AM
Information risk management, Information security, Information security careers, IT careers, IT salaries
Join Imperva CTO, Amichai Shulman as he details the findings from one of the most comprehensive data security studies, which surveyed nearly 1000 security and IT professionals. This webinar provides: Best practices for compliance and data breach prevention An overview of the most commonly used data security controls A detailed description of what your security [...]
Answer Question | September 15, 2010 2:06 PM
Information security, Security
Data Security: The New Paradigm in Info Security Wednesday, September 15, 2010 @ 2:00 pm EDT (New York, GMT-04:00) One major challenge in data security is the lack of awareness into which controls improve security outcomes. Typically, security controls are chosen based on anecdotes, personal experiences, and perhaps private conversations with peers. Today’s IT professionals lack [...]
Answer Question | September 14, 2010 2:56 PM
Information security, Security
Would you give me guide lines on developement steps and initial requirements of information security fraemeworks?
Answer Question | December 29, 2011 9:02 PM
Information security, IT Decision Frameworks, Security protocols
I want to make a career in information security field. I have already completed my MCSE. What can I do next to ensure I have a long-term successful career in network security?
Answer Question | December 4, 2009 11:37 PM
Career development, Career in Information Security, Careers, Careers in networking, Information security, MCSE, Network security, Networking
What are credible entry level security certifications? There are so many and Im confused. I am Comptia A+, network+ and MCTS server 2008 certified along with a CIS bachelors
Answer Question | September 8, 2009 3:31 PM
Certifications, Information security
My laptop got stolen yesterday. It has Windows Vista Ultimate 64-bit. Can a remote access find or install LoJack on it?
Answer Question | September 21, 2010 7:49 PM
Information security, Laptop Security, lost or stolen device recovery, Network security, Networking, Remote access
I all ready got to know the way to block the messengers from the link on how to block messengers with ISA-server firewalls. I wanted to know the way to block a particular URL on ISA Server 2004. How can I do that?
Answer Question | September 15, 2009 7:47 PM
Information security, ISA 2004, ISA Server 2004, Network security, Networking, URL Blocking
In a nutshell, which would be a good way of putting together a business case for a solution that mitigates security risks, when the “income” generated by the solution is not easy to define?
Answer Question | August 29, 2009 1:22 PM
Information security, Risk management
how can we provide the security while migrating the data?
Answer Question | July 28, 2009 8:06 AM
.NET Framework 3.5, Data migration, Data migration tools, Information security
what to do if files were taken by a hacker
Answer Question | April 21, 2009 1:48 AM
Data security breaches, Files taken by Hacker, Hacked, Information security, Risk management, Security forensics
I am getting into Info Sec and I am curious about pen testing tools. I am digging around in BackTrack 3 right now and while there are some good tools in there I am looking more for like searching for vulnerabilities with exploits and whatnot. I have a network to test with, albeit not a [...]
Answer Question | March 26, 2009 5:35 PM
Information security, PEN testing
Hello, I am Rahul and would like to know that apart from education, how much technical knowledge and experience is necessary to do something good in Information Security? To refine how much of Programming, Operating Systems, Networks knowledge and experience is required? Please feel free to point out any of the areas I am missing [...]
Answer Question | February 25, 2009 7:19 AM
Information security, Information security careers, IT careers, IT jobs, Security careers
I would like to get my BSc in Information Security Systems. In the near future I would like to get a networking security career. Do you think this is a good degree? Otherwise what can I do to get into the security field?
Answer Question | February 11, 2009 7:47 PM
BSc, Degree, Degree programs, degrees, Information security, Information security careers, IT career planning, IT careers, IT jobs, Network security, Networking, Training, training and certificatio, Training/education
What are the different types of Security Testing?
Answer Question | December 8, 2009 10:12 AM
Information security, Security, Security testing, Security Testing Type, Testing
Hello. Can anybody help me knowing the difference between Information Security and IT security?
Answer Question | June 6, 2011 5:36 AM
Can a company do an ISO 17799/27001 certification in-house or does it require a third party to come in and do it? what about after that – are recertifications required or can that be done in house with an internal auditor?
Answer Question | June 6, 2011 10:17 PM
Information security, Information Security Management System, ISO 17799, ISO 27001, ISO/IEC 27001, Security audits, Security certifications