• Take these steps to keep your data secure.

    How to avoid the five most common causes of data breaches

    Organizations around the country lost over 250 million records in data breaches during 2013 alone. This startling statistic, compiled by the Privacy Rights Clearinghouse, corresponds to more than one record for every adult American. Those records include credit card numbers, health information, employment data and other sensitive information that may lead to identity theft for …

    Read Article
  • Employers don't always look at your work experience as much as they should.

    Dear CertMag: My work experience isn’t getting me hired

     Dear CertMag  is a weekly feature that addresses common questions about certification and related IT issues. Have a question? Send an e-mail to editor (at) certmag (dot) com.

    Dear CertMag: I’ve been out of a job and looking for the past 10 months. My employer, a small IT consulting firm in Atlanta, hung in there …

    Read Article
  • Standard multiple choice exams are bad for the business of certification.

    Certification exams: Time to move on from multiple choice

    This feature first appeared in the Spring 2014 issue of Certification Magazine.

    Multiple-choice certification exams are a dime a dozen, and they really aren’t that great. This popular form of assessment has a lengthy list of advantages for exam creators, but the act of filling in a bubble for A, B, C, or D doesn’t …

    Read Article
  • Study slump SIZED

    Dear CertMag: How can I nail my certification test retake?

     Dear CertMag  is a weekly feature that addresses common questions about certification and related IT issues. Have a question? Send an e-mail to editor (at) certmag (dot) com.

    Dear CertMag: I’ve been working in IT security for several years. I have two certs from GIAC, the GISF and the GSEC. I recently whiffed on my …

    Read Article
  • Understanding injection attacks can help you secure your websites.

    Picture This: A Visual Guide to Injection Attacks

    Whenever any list of the biggest computing risks is compiled, it’s almost guaranteed that one or more injection attacks will vie for the top position. Injection attacks are commonly associated in news reports with SQL, but they can pop up in a variety of different places. There are injection-related vulnerabilities associated with headers, logs and …

    Read Article
  • Knowing — and implementing — a few simple fixes can keep your enterprise a step ahead of IT security threats.

    Security 101: Know the basics of eternal vigilance

    This feature first appeared in the Spring 2014 edition of Certification Magazine.

    “Boss, I think that someone got into my system.” Those are words that no computer user ever wants to utter, and no manager ever wants to hear. Unfortunately, they are heard in offices around the world every day. Last year, the Center for Strategic …

    Read Article
...89101112...203040...