For many, their summer soundtrack consists of upbeat playlists that are played just a little too loud during long commutes and road trips. For others, an informational podcast will do the trick. If you have any interest in the security industry, get a pen and a piece of paper to write down your carefully curated […]
Risk and Compliance
3 steps to becoming a threat hunting pro
Threat hunting is the process during which security professionals look for threats that already exist within their organization’s IT infrastructure. This differs from penetration testing (also called pen testing), which seeks out and identifies vulnerabilities that a hacker could use to invade a network. Here is our advice on becoming a threat hunting pro and safeguarding your organization. Build […]
Success: Secure360 Twin Cities 2018
Is it already over? Our team had such a great time at Secure360 Twin Cities 2018 and we hope you did too. The event was a big success. We couldn’t have done it without our staff, volunteers, speakers, sponsors and attendees. The week was filled with great conversation, including your feedback! We heard everything you […]
Secure360 events: Everything you need to know
Secure360 has grown significantly every year, and in 2016 we were excited to announce and host our first expansion events. If you have currently attending Secure360 in the past, or you’re just hearing about our events for the first time, here’s a quick run-down of our conferences to help you plan which event you should […]
Secure360 Twin Cities 2017 recap
All we can say is, “WOW!” Secure360 Twin Cities 2017 was a huge success, and we have staff, volunteers, speakers, sponsors and, of course, attendees to thank for that. Our staff and UMSA board members are listening to your feedback throughout the event—both negative and positive—and we’re taking note. We want to continue to make […]
Addressing security and compliance in a multi-Cloud world
The following is a guest post by a 2017 Secure360 Twin Cities Platinum Sponsor BMC Software. Let’s face it—the world of information technology has changed dramatically in the last several years. A de-centralized era of IT has emerged and opened up a myriad of business opportunities while organizations find new ways to evolve their transformations to […]
Top 5 security predictions for 2017
Every year, our industry is bombarded with new technologies, new methods of attacks and hacks, and new terminology. It’s a constantly changing industry, and as a professional within the midst of it, it’s important to be staying up to date. Here are a few of the top security predictions for this upcoming year: Internet of […]
7 classifications of security careers
The security industry is growing at a great pace. In December 2015, Forbes reported that worldwide spending on information security would reach $75 billion for 2015, and the global cybersecurity market was expected to be worth $170 billion by 2020. As the industry expands, so does the demand for security professionals and the number of jobs. NIST’s Cybersecurity Workforce […]
The biggest breaches of 2016
2015 was a rough year for many businesses getting hit by data breaches—two notable attacks included the scandalous Ashley Madison hack and the extortion attack on Sony. Many businesses buckled down on their security measures and focuses on protecting their organizations from these sorts of attacks, but as security measures became more advanced, so do […]
The challenges of incident response
Ninety-eight percent of IT security pros find incident response to be a challenge and 71% say it’s grown more difficult over the past two years, according to a new survey by Enterprise Strategy Group, sponsored by Hexadite. “It’s a combination of several different factors, but the main problem is the inability to investigate every alert,” says Hexadite’s […]