Tag Archive for: Teach

US experts to teach Saudi students cyber warfare

  1. US experts to teach Saudi students cyber warfare  Arab News
  2. Crown Prince Meets with US Envoy for War against ISIS  Asharq Al-awsat English
  3. Mohammed bin Salman Cyber Security College signs deal with IronNet Cybersecurity  Al-Arabiya
  4. Full coverage

cyber warfare news – read more

What A Cyber Security Firm Can Teach You About Making Your Pitch

  1. What A Cyber Security Firm Can Teach You About Making Your Pitch  Forbes
  2. Endeavour targets coverage gap with new cyber security offering  Intelligent Insurer
  3. Cyber Security: Password Protected  The Future of Things (press release) (blog)
  4. Full coverage

computer security news – read more

Lessons learned: What can network security teach partners about mobile security? – Channelnomics


Channelnomics

Lessons learned: What can network security teach partners about mobile security?
Channelnomics
Luckily, solution providers don't have to start from scratch when it comes to mobile security. With network security already a key part of many channel partners' offerings, they can turn to learnings from working in this established space to capitalize

“mobile security” – read more

IDG Contributor Network: What terrorism investigations can teach us about investigating cyber attacks

Having a military background, I tend to look at all security issues with the perspective of someone who’s served in the armed forces. That means using a thorough investigation process that doesn’t treat any action as accidental or an attack as a stand-alone incident and looking for links between seemingly unconnected events.

This method is used by law enforcement agencies to investigate acts of terrorism, which, sadly, are happening more frequently. While terror attacks that have occurred in the physical world are making headlines, the virtual world is also under attack by sophisticated hackers. However, not much is said about the similarities between investigating both types of attacks or what security researchers can learn from their law enforcement counterparts. I’ve had this thought for awhile and, fearing that I’d be seen as insensitive to recent events, debated whether to write this blog. After much thought, I decided that the stakes are too high to remain silent and continue treating each breach as a one-off event without greater security implications.

To read this article in full or to leave a comment, please click here

Network World Security