6 Emerging Cybersecurity Risks You Should Be Aware Of

Last Friday I had the privilege of moderating a panel of experts discussing emerging security risks. Besides me, the panel at the New York Cyber Security Summit included Logan Brown (president of Exodus Intelligence), Joseph Fiorella (senior infosec engineer at Intel Security), Roy Katmor (CEO of Ensilo), Tom Kellerman (chief cybersecurity officer at Trend Micro), Hanan Levin (VP of products at Illusive Networks), and Dr. Bernard Parsons (CEO of Becrypt). Here are six takeaways from the panel; they should provide valuable [...]

Read more...

10 Best IT Certifications For 2016

With successful hacking attacks on many corporate and government systems and networks, CyberSecurity & Security training moves to the front in 2016.  With over 1MM IT Security jobs available now as a result, and IT Security salaries rising fast, IT Security is here to stay at the front of IT work. 1.  Certified Ethical Hacking/Computer Forensics/Security Analyst/Licensed Penetration Tester.  There are two kinds of organizations today, those that know they have been hacked, and those that don’t know they have [...]

Read more...

Over 1MM IT Security Jobs Available – What Does It Take To Get One – Part 2

Over 1MM IT Security jobs are available to those having the skill sets to do them.  After gaining the knowledge that is offered in the A+/Network+/Security+ courses to include understanding all of the components of PCs, how the components interact with each other and the Operating System, understanding Network communications with DNS, SubNetting, Packets, and understanding all of the basic tenants of Security for IT, you are ready to move on to vendor specific solutions to networking. By far the [...]

Read more...

Over 1M IT Security Jobs Are Available – What Does It Take To Get One?

IT Security jobs will be the most needed jobs in the future of IT.  It doesn’t matter if your organization produces great products, services, hardware, military equipment, etc, if Hackers from other countries or competitors can get the information that you have developed on how to make these products and make similar products themselves.  They do not need to invest in R&D, test out different materials, and spend $MMs or $BBs to create your product.  They can steal all of your [...]

Read more...

IT careers: Security talent is red-hot

Security pros are in high demand, and companies are willing to pay top dollar for the right candidates. Do you have what it takes to succeed on the infosec career track? For full story, see: http://www.computerworld.com/article/2909569/salarysurvey2015/it-careers-security-talent-is-red-hot.html Begin or advance your IT Security career by attending Security Certification Courses with CED Solutions! Protect your systems and networks with the knowledge gained from the new Cisco Course: Cyber Security Specialist (7/6 to 7/11, 8/10 to 8/14, 9/14 to 9/18); ISC2 Official CISSP course (7/20 to [...]

Read more...