10 Dos and Don’ts for security job interviews

From CIO (Joan Goodchild)

The pickings are slim in the job market and the time line of interviewing and then hiring new people is slow. But there are positions available in the security field, according to three veteran security recruiters that we spoke with recently.

If you get a call that you’ve got a shot at a job interview, every move counts. How can you have an edge over other candidates angling for the same position? Our experts weigh in on important steps to excel when you get your chance to wow a possible new employer.  Read the full story [cio.com]

From CIO (Joan Goodchild)

The pickings are slim in the job market and the time line of interviewing and then hiring new people is slow. But there are positions available in the security field, according to three veteran security recruiters that we spoke with recently.

If you get a call that you’ve got a shot at a job interview, every move counts. How can you have an edge over other candidates angling for the same position? Our experts weigh in on important steps to excel when you get your chance to wow a possible new employer.  Read the full story [cio.com]

Suggested articles

Applicants Coerced Into Surfing Facebook While Employers Watch

If you want to get that slick job you’ve been gunning for, you might have to suffer a bit of snooping.  According to recent news reports, employers are increasingly asking applicants for jobs to submit their user credentials or asking to watch while applicants peruse their own social media account. 

The Global Illicit Economy

Nils Gilman, an author and entrepreneur, details the common themes and techniques that connect the actors in the illicit economies around the world, including the malware and botnet economies.

The Economics of Botnets

From Viruslist.com (Yury Namestnikov)
In the past ten years, botnets have evolved from small networks of a dozen PCs controlled from a single C&C (command and control center) into sophisticated distributed systems comprising millions of computers with decentralized control. Why are these enormous zombie networks created? The answer can be given in a single word: money.
A botnet, or zombie network, is a network of computers infected with a malicious program that allows cybercriminals to control the infected machines remotely without the users’ knowledge.  So how does one start? What does a cybercriminal in need of a botnet do? There are many possibilities, depending on the criminal’s skills. Unfortunately, those who decide to set up a botnet from scratch will have no difficulty finding instructions on the Internet.  Read the full paper (viruslist.com)