The government wants to see more universities offer
post-graduate training in world-class cybersecurity as part of its National
Cyber Security Programme. As part of the initiative, several government bodies,
including GCHQ in Cheltenham, have grouped together
to encourage universities to apply for funding. As discussed in this month’s
Computer Weekly magazine, the Engineering and Physical Sciences Research Council
(EPSRC) hope eventually to establish two dedicated centres for Doctoral
Training. In April this year some universities already achieved “Academic
Centre of Excellence in Cyber Security Research” status in the initial stages
of the programme. "If the UK
is to…maintain its reputation for world-class capability in cybersecurity, it
is vital that we look to discover, develop and nurture the UK ’s next
generation of doctoral-level cybersecurity experts," said David Willetts,
minister for universities and skills. For more on the future of cybersecurity
training read the full article at http://www.computerweekly.com/news/2240159950/Universities-invited-to-train-cyber-spooks
Permanent and contract opportunities for analyst programmers, project managers, business analysts, system analysts, consultants, team leaders, developers technical architects, network analysts, technical support, network designers, technical presales, network support, web designers / developers
Monday, 23 July 2012
Monday, 9 July 2012
Is it really good to share?
It
used to be the case that sensitive company information could not be distributed
or released without permission and a rubber stamp from senior management. In
the digital age, sensitive data, intellectual property and brand information
are distributed more widely via social media, Skype, online profiles and C.Vs.
The ‘sharing’ is often done by an unaware younger workforce. An article from SC
Magazine looks at the headache that this can cause information security
professionals and the companies they are trying to protect. “We're living in a world where our entire
emerging workforce has grown up online and has been engineered to over-share.
Big data miners have taken notice,” says one interviewee. Such information can
be used to plan targeted attacks on security systems or be used to competitive
advantage. Information security training is one suggestion as well as clear
guidelines in employment contracts. Find out more about the problems with sharing
by reading the full article at http://www.scmagazineuk.com/the-problem-of-employees-sharing-too-much-information/article/248318/
Subscribe to:
Posts (Atom)