Cyber Defense

September 17 Joint ISACA & ISSA Chapter Meeting

DEARBORN - ISACA and ISSA Detroit chapters are hosting a joint meeting on Sept. 17 featuring special agent David Martin who will discuss APT-Cyber espionage protection strategies. The after dinner topic is Business Impact Analysis on the Corporate Radar. The speaker is Steven Aiello, CISSP, CISA, SANS, GSEC, VCP and CNNA. WHEN: September 17 -

By |2014-08-26T00:00:00-04:00August 26th, 2014|Archive, Cyber Defense|

Does Alma Mater Matter For Tech Pros? Not So Much, Says CIO In Survey

DETROIT - Seventy-one percent of chief information officers said they prioritize skills and experience over college degrees when making hiring decisions, a new survey reports. Another 12 percent said they place a little weight on the prestige of a job seeker?s university when evaluating applicants; only 5 percent are heavily influenced by an impressive alma

By |2014-08-20T00:00:00-04:00August 20th, 2014|Archive, Cyber Defense|

MSU Professor Wins International Pattern Recognition Award

EAST LANSING - Advancing the science that recognizes people by their face, fingerprints, gait, and voice - and protecting the privacy of those images - have earned an international award for a faculty member in the Michigan State University College of Engineering. Arun Ross, an associate professor of computer science and engineering at MSU, will

By |2014-08-20T00:00:00-04:00August 20th, 2014|Archive, Cyber Defense|

IT Salary Survey: Security Moving In The Right direction

NEWTON, MA. - Total compensation is up, and one-third of IT organizations are looking to make new hires, according to the TechTarget 2013 information security salary survey. Are you paid what you're worth? Results from our TechTarget 2013 annual salary and careers survey, which looked at IT security professionals and IT personnel who spend their

By |2014-08-20T00:00:00-04:00August 20th, 2014|Archive, Cyber Defense|

LinkedIn Scammer Techniques Are Getting Scary

BIRMINGHAM - This is an update to the article about identifying LinkedIn scammers when they request a connection. In that article we listed six ways to identify fake accounts. 1.Look at that URL. If it indicates that this is a new account (anything over 300 million right now) be very suspicious. Other than your kids

By |2014-08-14T00:00:00-04:00August 14th, 2014|Archive, Cyber Defense|

Want A Safe Car? Check Its Cyber Safety Rating

LAS VEGAS - Cars are often rated on things like performance, comfort, value, and safety. But what about computer security? As cars become more computerized, should there be a rating system to let consumers know how safe vehicles are from hacking? That's exactly what security advocacy group I Am The Cavalry proposed at the annual

By |2014-08-11T00:00:00-04:00August 11th, 2014|Archive, Cyber Defense|