Saturday 28 March 2015

Six entry-level cybersecurity job seeker failings

Here's how many cybersecurity entry-level job seekers fail to make a great first impression.

When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that’s not as easy as it may seem.

According to a poll last summer of 1,000 18–26 year olds conducted by Zogby Analytics and underwritten by Raytheon, about 40 percent of Millennials reported they would like to enter a career that makes the Internet safer, but roughly two-thirds of them said they aren’t sure exactly what the cybersecurity profession is, and 64 percent said that they did not have access to the classes necessary to build the skills required for a career in information security.

That means, at least when it comes to the entry-level information security market, that there will be many job applicants continuing to enter the field with backgrounds that lack formal information security training. This echoes what we hear when we speak with CISOs and others who often hire security talent.

With all of this in mind, we recently reached out to those CISOs to see if there was a common thread of mistakes among information security career newcomers who are in the job market. Here’s what we found:

1. Fail to show oneself as a team player
Sounds like a no-brainer, right? But it’s not. Many of the hiring executives we spoke with say that personality can – and often does – trump technical assets. This is especially true as more and more information security roles interface with the rest of the business. It’s essential that applicants be themselves – amiable, articulate, and able to prove that they can work with different areas within the organization.

2. Sell one's self as a jack-of-all-trades
“Entry level applicants across almost all verticals of information security make the mistake of trying to be a one-size-fits-all candidate,” says Boris Sverdlik, head of security at Oscar Insurance. “Security is broken up across many verticals and even among those who are experienced, it's almost impossible to be well versed in all aspects,” he says. “The most annoying candidate is the arrogant know-it-all,” says Brian Martin, founder atDigital Trust, LLC. “I don't mind arrogance when it's earned, but not in a kid who's never been tested. In cases where we've tried to work with these types, it hasn’t ended well.”

If you have interests in many skills in information security, highlight a couple that best meet the needs of the organization.

3. Falling flat on job search and interviewing basics
For many CISOs, such as Martin Fisher, manager of IT security at Northside Hospital, it is common for potential hires to harm themselves by flunking the basics of job seeking. “On resumes, misspell HIPAA, and I’ll toss the resume,” Fisher says. He also says that he too often encounters typos, punctuation errors, and resumes laden with information that's not relevant to the role being offered.
INSIDER: 15 ways to screw up a job interview

Mike Kearn, principal security architect at US Bank, cited what job seekers don’t do when it comes to the basics of interviewing. “When I offer them an opportunity near the end of the interview to ask me anything, and I emphasize the word ‘anything,’ the majority ask me softball kinds of questions about culture or why I like working there. Missed opportunity on their part,” he says.

4. Believe certifications and degrees matter more than practical skills
“Many think that I care more about their degree or certifications than actual skills,” Kearn says, while others are under the misguided assumption that a degree or a certification equals a job. It doesn’t."

Likewise, many entry-level applicants think technology is the hammer to squash every security risk nail. “Too many think that the solution to most problems is a technology control, rather than people and processes,” says Eric Cowperthwaite, former CISO for Providence Health and Services and currently advanced security and strategy VP at Core Security Inc.

Ben Rothke, senior eGRC consultant at Nettitude Group and former CISO, agrees. “The technology tools they have experience with are the definitive techniques for approaching information security. Not every security problem can be fixed by a firewall or IDS,” says Rothke.

5. Stretch the truth
This one certainly isn’t exclusive to information security, but it is especially silly to try to pull this off on experience security professionals who tend to be a suspicious bunch by nature. “You'll notice that they tend to exaggerate their experience to impress hiring managers; some range from slight fibs to full-blown lies,” says Sverdlik.
Have you ever caught a candidate in a lie?

Yes, but yet they continued with the charadeYes, and they admitted to it No VoteView ResultsPolldaddy.com

Kearn concurs: “A lot of them attempt to inflate or enhance their resume by saying they know someone and are connected via LinkedIn. But when I press them on it, because I actually know the individual personally, they cave almost immediately.”

6. Don’t understand the highly interpersonal nature of infosec
Many entry-level applications come from workers in small businesses, and they are not prepared for or don’t seem to understand how large enterprises function. That’s fine, and part of the learning process for new professionals – but keep an open and learning mindset when it comes to practicing information security at a larger enterprise. “A lot of people have expressed ways to do business that simply won't work in a large enterprise. Typically, the person would be very direct toward people who want an exception to security policy, avoid collaboration, avoid discovering why the person wants the exception, and just dictate behavior,” says Cowperthwaite.

“They often don’t realize that their excitement and sometimes irrational exuberance around all things information security is not shared by most people in the organization,” Rothke says.

In the end, perhaps the most important thing is to be one's self. “Show that you have a passion for security, be it examining logs, performing code review or risk assessments, or even administering security appliances. If you are good at critical thinking and have a good technical background, learning the rest is easy,” says Sverdlik.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Saturday 14 March 2015

Oldest dot-com address sits sadly underused 30 years after its historic registration

Someone had to go first, so on March 15, 1985, Lisp computer maker Symbolics, Inc., registered the Internet’s first dot-com address: Symbolics.com.

Someone had to go first, so on March 15, 1985, Lisp computer maker Symbolics, Inc., registered the Internet’s first dot-com address: Symbolics.com.
job searching akamai

The Cambridge-headquartered company went out of business about a decade ago (though remnants live on) and in August 2009 the Symbolics.com address was sold for an undisclosed sum to XF.com Investments, whose CEO Aron Meystedt said in a press release: “For us to own the first domain is very special to our company, and we feel blessed for having the ability to obtain this unique property."

Today it looks like more of a white elephant than a blessing, what with a largely empty “cityscape” design and a blog that hasn’t been updated in two years. Yet Meystedt remains optimistic, at least outwardly.

“We created the city concept to make browsing the site fun, but it also could grow into a revenue-generating property if we allow advertisers to sponsor elements in the cityscape,” he says.

The design includes clickable elements that reward the visitor with nuggets of information about the Internet, such as: “Gmail first launched on April 1st, 2004. It was widely assumed the service was an April Fools Day joke.”

Not exactly Reddit’s “Today I Learned.”

“As far as traffic, the daily visitors can range from several hundred to several thousand,” Meystedt says. “This usually depends on how well Symbolics.com is circulated on social media or news blogs.”

And that probably picks up around March 15.

The problem here appears obvious: Symbolics.com is not Plymouth Rock; it would appear to be valuable – at least in a business sense – only if you’re running a company called Symbolics.

I asked Meystedt if Symbolics.com might be for sale.

“We have no plans to sell the name at this time.”

Make him an offer.


Tuesday 3 March 2015

The myth about how Amazon’s Web service started just won’t die

The myth about how Amazon’s Web service started just won’t die

How AWS got started and what its co-founder is doing now that he says could be bigger than cloud

There’s a rumor that goes around cloud circles about how Amazon.com created what is now the multi-billion dollar infrastructure as a service (IaaS) cloud computing industry in the early 2000s.

Some people wrongly assume that Amazon had spare, excess computing capacity from their ecommerce site that was used as the basis for Amazon Web Services' (AWS) cloud.

It’s something that Benjamin Black has heard a lot. But it’s not true. And he would know: Black is widely credited with co-authoring the initial proposal at Amazon that led to the creation of AWS.

“Why will that not die?” Black says about the rumor. “It’s totally false.”

Black, who recently accepted a new position at cloud company Pivotal, says from day one, every part of AWS has been purpose built for AWS. And now he’s hoping to work on a new project that he says could be even bigger than the cloud he helped create at Amazon.

How AWS actually got started

Benjamin Black co-authored a paper at Amazon.com in 2003 that helped kick off Amazon Web Services and the IaaS cloud computing market. Black now works at Pivotal.

In 2003 Black was running a website engineering team at Amazon. The company was growing fast and IT wasn’t keeping up. Black worked with Chris Pinkham, who he says is one of the best managers he’s ever worked with. Pinkham pushed Black to consider how Amazon’s infrastructure could more efficiently scale up. They explored how abstraction and decoupling the applications from the infrastructure could make it easier to manage.

“We realized there could be a lot of value in doing that, and a lot of value to others potentially outside of Amazon,” Black told Network World. “We could sell it (the infrastructure) as a service.” Black and Pinkham wrote up the idea, which made its way to Jeff Bezos, who greenlighted the proposal. Pinkham then led a team to build Elastic Compute Cloud (EC2), which are virtual machines as a service and one of AWS’s first products released in 2006.

"Right off the bat we just thought it would be an interesting thing to do. It took a while to get to a point of realizing that this is actually transformative."

Benjamin Black
That seed of an idea turned into what is now the market-leading IaaS public cloud computing company. Amazon was estimated last year by Gartner to have a public cloud that is five times larger than its next 14 competitors combined. Needless to say, the idea Black helped start took off. Pinkham went on to found startup Nimbula, which Oracle bought and used as the basis for its cloud platform. Pinkham now works as an engineering vice president at Twitter.

How did Bezos receive the idea? Black recalls Bezos envisioning a platform that would give anyone, such as college kids in a dorm room, the tools they would need to start a new company.

“That’s still the idea people have about it,” Black says. “At the same time, it’s taking over the world.” He says the fundamental key to AWS, which remains today, is that it provides the undifferentiated technical infrastructure to anyone who wants it – whether that’s VMs, storage, or Hadoop as a service.

Some of the directions Amazon has taken AWS have surprised Black. AWS is moving further and further “up the stack” to provide application services, like virtual desktops and email. Not everything he and Pinkham proposed made it into the initial version, but every change was for the better, he wrote in a blog post describing the origins of EC2.

Did Black realize the idea he and Pinkham proposed to Bezos would turn into what is has today? Far from it. “Right off the bat we just thought it would be an interesting thing to do,” he says. “It took a while to get to a point of realizing that this is actually transformative. It was not obvious at the beginning.”
How the Internet of Things could be the next cloud

Black has a new gig now. After stints at Microsoft, VMware, advising the company Chef and starting his own monitoring company named Boundry, cloud company Pivotal hired Black as senior director of technology. Pivotal, which is a spinout from VMware, EMC and has substantial backing from General Electric, is behind the open source platform as a service (PaaS) Cloud Foundry.

Whereas an IaaS like AWS is a massive distributed system of virtual hardware and services - like compute, storage and databases - a PaaS is an application development and hosting service.

In his new role at Pivotal Black hopes to spearhead the company’s burgeoning Internet of Things (IoT) lab in Seattle, where he lives.
INSIDER: 5 ways to prepare for Internet of Things security threats

There’s an opportunity for a company like Pivotal to create a series of application components that can be used in IoT that serve as a basis for many other IoT apps, Black says. “There are some pretty basic patterns across all of these desired apps,” he says. “What we’re looking do is develop the primitives that would allow anyone to get into the IoT marketplace.”

When asked how the IoT market could compare to the cloud computing market that he helped usher in, Black said: “Bigger.”



Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday 2 March 2015

Update: A mobile payment battle is blazing


All eyes are on Samsung Pay and its embedded LoopPay inside the Galaxy S6 smartphone

Mobile in-store payments could grow dramatically in the U.S. as the result of a battle brewing among tech giants Google, Samsung and Apple.

In the latest development, Samsung today revealed Samsung Pay, a new mobile payment strategy, combined with its new Galaxy S6 and Galaxy S6 Edge smartphones. Samsung Pay relies on two technologies: a new magnetic transmission capability from startup LoopPay embedded as a copper ring inside the Galaxy S6 and the older Near Field Communications technology used in earlier Galaxy S smartphones.

The two phones will ship April 10 in 20 countries , including the U.S., but Samsung Pay will not go live until this summer, first in the U.S. and South Korea.

Having both mobile payment technologies embedded inside the Galaxy S6 will allow its users to make purchases at up to 90% of the estimated 12 million payment locations at U.S. stores. That's because the lion's share of the older point-of-sale terminals in use in the U.S. still have magnetic stripe card readers which support the new Galaxy S6 technology.

By comparison, Apple Pay and Google Wallet rely on newer NFC-ready terminals, which are gradually being rolled out in the U.S. and should reach about 50% of point-of-sale locations by year's end, according to estimates by credit and debit card companies. While NFC grows, magnetic technology could help fill the mobile payment gap.

"Samsung Pay certainly heats up the competition, and that's a good thing for mobile payment adoption," said Gartner analyst Avivah Litan in an interview. "But Samsung still has a lot of work to do to improve the user experience before it can effectively compete with Apple."

Informal field tests by Gartner of the magnetic LoopPay technology showed inconsistent performance when used with some magnetic readers on stores' point-of-sale terminals, Litan said. Gartner used LoopPay's magnetic technology incorporated inside its earlier phone cases and fobs, not the same technology embedded in the Galaxy S6. Embedding the copper ring inside the Galaxy S6 will hopefully reduce the inconsistent performance, she said, but LoopPay "is definitely not going to work at every magnetic-stripe reader."

Samsung and Visa were investors in startup LoopPay last summer, and Samsung on Feb. 18 announced it had acquired LoopPay for an undisclosed sum.

MasterCard confirmed that it will support Samsung Pay by deploying tokenization software for both magnetic and NFC transactions. Other credit and debit card companies, such as Visa and American Express, will follow suit with tokenization and will also support Samsung Pay, Samsung said. Major credit card companies and banks have backed Apple Pay with NFC, which rolled out last fall for the iPhone 6 and iPhone 6 Plus, and have already widely marketed the concept. Bank of America, Chase, Citi and US Bank are also on board with Samsung Pay, Samsung said.

Google Wallet, which first emerged in 2011, was slow to catch on, but Google on Feb. 23 announced a deal to buy technology and capabilities from SoftCard, another NFC-based mobile payment system. The purchase means that Google Wallet will be pre-installed on new Android phones at Verizon, AT&T and T-Mobile later this year.

MasterCard said it agreed to support Samsung Pay with the LoopPay magnetic payment option only after setting up the tokenization security technology to support it. Tokens are crytographs, a kind of code, that are used instead of a customer's actual credit or debit card number to bolster security, and have been used with NFC payments in Apple Pay and other payment systems.

"Tokenization is how we got comfy with the magnetic secure transmission (MST) technology portion, and we wouldn't have supported [Samsung Pay] without [tokenization]," said Sherri Haymond, group head of MasterCard channel management.

When a MasterCard customer with a Galaxy S6 ready to make a purchase approaches a point-of-sale terminal equipped to handle either magnetic or NFC payments, the system is set up to give preference to NFC payments, Haymond said in an interview.

"We're viewing this MST as a bridge technology to enable consumers to take advantage of digital payments while NFC catches on," she said. "We do believe NFC is the wave of the future."

Mobile payment adoption is based on a complex set of technologies and business relationships. A major stumbling block in the U.S. has been the conversion of millions of payment terminals at U.S. retailers to more secure technology that supports smart cards and, usually, NFC. In addition to Apple Pay, Google Wallet and Samsung Pay, many experts are watching a consortium of large retailers called MCX that includes WalMart and Best Buy to see how MCX will affect mobile payment rollouts. MCX is not relying on NFC, at least initially, and may or may not support the LoopPay magnetic approach.

"How MCX members respond to Samsung Pay will be fascinating to watch," said Tim Sloane, an analyst at Mercator Advisory Group. The mobile payment space "is really getting interesting."

Unlike MCX, Samsung Pay will still rely on credit and debit cards and the banks that extend credit to consumers. Many merchants, including those in MCX, object to paying banks a fee of about 3% per credit-card transaction while also having to update their point-of-sale terminals to support smart cards. Merchants have an Oct. 1 deadline to upgrade their terminals to accept smart cards to avoid financial liability in the event of credit card fraud with older magnetic stripe technologies. Many of the updated terminals, estimated at about 80%, also support NFC payments with smartphones.

The technology changes have been a burden for merchants. "Merchants are really frustrated with all these mobile payments," Litan said. "The systems are opaque and banks are keeping information close to the vest."

What's apparent with Samsung Pay and other mobile payments is that the rate of adoption is not only about new technologies, but also business partnerships. So far, Apple has excelled in creating partnerships with credit card companies and major banks, as well as many large retailers. Apple and its bank, card and retail partners have aired a steady stream of TV ads and other promotions to show the ease of using Apple Pay with NFC for quick in-store payments.

"The path to mobile payments is not only in the technology, but how many partnerships you can form with financial institutions and retailers willing to accept your particular solution," said analyst Jack Gold of J. Gold Associates. "If Samsung can build an ecosystem that provides for its technology, then it can be a player. Apple, almost by default, will have such an ecosystem. Everyone seems to want to support whatever Apple does, because of its weight in the marketplace. We'll have to see if Samsung can bring the same weight with its payment technology."

Various things could happen to help Samsung with Samsung Pay. If, for example, Samsung decides to license the LoopPay magnetic transmission technology to other device makers -- even Apple and Google -- then Samsung could reap benefits. On the other hand, if Samsung Pay turns out to be highly successful, both Apple Pay and Google Wallet could ultimately be "marginalized," Sloan said.

While that scenario may seem far-fetched to many, Samsung Pay has opened a lot of eyes.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com