Risk vs. reward. Responsibility vs. stability. Leadership vs. predictability. Much more so than in most professions, IT peeps have the luxury of choosing whether to “go it alone” as a consultant or “work for the man” as an employee. So who do you want to be as you grow up? Summary article by David Weldon in FierceCIO, original piece by …
CIO Cha-Ching
Big responsibility, big money. Typically you don’t get one without the other. If you aspire to be at the top of your game, the article below outlines the current payscale for US CIO success. By Ann Bednarz in NetworkWorld. Related slideshow is also available here — and a similar CIO article from last year is here. Emphasis in red added …
What the NIST Cybersecurity Framework Means to You
Read and heed. By Ernie Hayden in Industrial Safety and Security Source (and an excerpt from the Practical SCADA Security blog at Tofino Security). Emphasis in red added by me. Brian Wood, VP Marketing ——— NIST Cybersecurity Framework: What it Means You may have heard some buzz in the press about the release of the Cybersecurity Framework Draft from the …
Cloud Computing: Same As It Ever Was?
When the tide is high we cannot see the rocks lurking below the surface. When the tide is low, all is exposed. Either way, the rocks are always there. The wise captain uses all the tools available to avoid calamity regardless of the state of the tide: charts, depth-finders, sonar, even lookouts. Are YOU doing all you can do? Article …
CyberSecurity Salary Trends
Responsibility has its privileges — like higher pay. Higher risk, higher reward. Article by Chris Burt in The WHIR. Emphasis in red added by me. Brian Wood, VP Marketing ——— New Study Details Cybersecurity Salary Trends for 2013 Fifty-percent of Chief Information Security Officers earn an average annual base salary equivalent to that of other C-level executives, according to a …
Lessons Learned from 4 Big Data Breaches
Reading about the specific ramifications of high-profile security breaches is a good way to remind oneself that the cost of prevention is always less than the cost of cleanup. Sobering stuff. By Ericka Chickowski in Dark Reading. Emphasis in red added by me. Brian Wood, VP Marketing ———- Lessons Learned From 4 Major Data Breaches In 2013 In many respects …
Hubris Precedes Regret (and Security Breaches)
Just when you think you’ve got it all figured out — BAM! Intrusion. Malware. Data leak. Data loss. DARN IT! When will we silly people ever learn what Andy Grove taught us? “Only the Paranoid Survive” First article posted on Help Net Security and the second one is by Antone Gonsalves in CSO. Emphasis in red added by me. Brian …
Data Center Credentials: Trust But Verify
Self-reported grade inflation is a common occurrence: everybody wants to be ranked at the top. And who’s going to notice if a folks take a few liberties with the truth? Verification and reference checks are so 20th century. Besides, if someone aspires to have a particular type of certification, isn’t that what’s really important? WRONG! Trust but verify. By James …
NASA’s JPL Gives Data Deluge Whole New Meaning
There’s big data and then there’s really big data — like, BIG DATA, yo. NASA’s JPL deals in all-caps. Fitting, right? Summary article by Pam Baker in FierceBigData; original post by Whitney Clavin on the JPL website. Discussion of big data challenges on MeriTalk, the Government IT Network. Emphasis in red added by me. Brian Wood, VP Marketing ——— NASA …
Ready, Fire, Aim! Enterprise IT Security
“I’ll document that later.” “I’ll be sure to close that port when I’m done.” “The CEO wanted to start using his new device right away.” OOOPS! By Fred Donovan, FierceITSecurity. Emphasis in red added by me. Brian Wood, VP Marketing ——– Cloud security being left out of enterprise security policy, PwC survey finds Only 18 percent of enterprises include cloud …