CSO Trend Micro Workshop
30 Aug | View galleries
One in four young adults is interested in a career in cybersecurity, a new survey has found, but two-thirds said their high schools weren't providing appropriate teaching to foster their entry into a market that is growing 3.5 faster than the overall IT job market.
The role of government in cybersecurity defences continues to morph, but there were interesting revelations that GCHQ employs 120 dyslexic and dyspraxic analysts to help in its fight against terrorism, while British PM David Cameron appointed a special envoy in charge of intelligence and law-enforcement data sharing. Interestingly, however, even as scrutiny of data sharing increases, Yahoo! reported that government requests for data had dropped overall, while one Australian cybersecurity expert said businesses and governments were increasingly seeking a collaborative approach to bolster overall cybersecurity profiles.
Increased pressure from the board room is making the CSO job harder and increasing security concerns are pushing many organisations to delay or abandon new business initiatives, a new global survey has found.
The cybersecurity profession and its role in keeping the Internet safe is lost among young adults, who are therefore less likely to pursue a career in the field, a survey shows.
Rising concerns about terrorist threats on Australian soil have increased the acceptability of data-retention proposals to citizens but the majority favour tight controls over its use, according to a recent survey of Australians' attitudes to cybersecurity.
The pace of change for Information Technology is challenging established notions of "What is IT?" and "What is Information Security in the modern age?" For one example, the "new" data center technologies such as virtualization, Software-Defined Networking (SDN), service-oriented delivery models, and cloud computing have radically changed the typical IT infrastructure from a defined set of assets owned and controlled by the organization to a constantly fluctuating roster of resources that can come and go from IT department visibility and control.
Leaders of the tech sector laud the Obama administration's rollout of voluntary cybersecurity guidelines, but broader private-sector adoption could remain a challenge.
The moment is a profound one.
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.