Definitions

Sorry, no definitions found. You may find more data at infosec.

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word Infosec.

Examples

  • The report notes the following as primary keys to effective IT support: Understanding how applications and their data behave in your dynamic virtualized environment; how your data is being preserved, provisioned and presented; identification of what training and education will be necessary to allow both you and your IT/Infosec departments to keep pace with technology.

    Christopher Burgess: You, Your Data and Its Data Center Christopher Burgess 2010

  • The report notes the following as primary keys to effective IT support: Understanding how applications and their data behave in your dynamic virtualized environment; how your data is being preserved, provisioned and presented; identification of what training and education will be necessary to allow both you and your IT/Infosec departments to keep pace with technology.

    Christopher Burgess: You, Your Data and Its Data Center Christopher Burgess 2010

  • Infosec certifications have been gaining popularity since 2005, when the Defense Department issued a directive known as 8570 that requires military employees, defense contractors and other federal employees involved with information assurance to have security credentials.

    Red Hat tops list of hottest IT security certifications 2010

  • The report notes the following as primary keys to effective IT support: Understanding how applications and their data behave in your dynamic virtualized environment; how your data is being preserved, provisioned and presented; identification of what training and education will be necessary to allow both you and your IT/Infosec departments to keep pace with technology.

    Christopher Burgess: You, Your Data and Its Data Center Christopher Burgess 2010

  • The report notes the following as primary keys to effective IT support: Understanding how applications and their data behave in your dynamic virtualized environment; how your data is being preserved, provisioned and presented; identification of what training and education will be necessary to allow both you and your IT/Infosec departments to keep pace with technology.

    Christopher Burgess: You, Your Data and Its Data Center Christopher Burgess 2010

  • He has also appeared on a discussion panel at an Infosec conference - you might remember, that's the organization that carried out surveys giving out free pens to London commuters in return for their passwords - the most common was "password" in 2002 but this had changed to the much safer "admin" by 2003.

    Archive 2009-08-01 Sci-Fi Gene 2009

  • By Week 36 in Review – 2009 | Infosec Events on February 11, 2010 at 5:42 am

    Checking Your WordPress Security 2009

  • He has also appeared on a discussion panel at an Infosec conference - you might remember, that's the organization that carried out surveys giving out free pens to London commuters in return for their passwords - the most common was "password" in 2002 but this had changed to the much safer "admin" by 2003.

    Was the truth out there? Sci-Fi Gene 2009

  • This is where the IT industry is headed, and when it gets there, there'll be no point in user conferences like Infosec and RSA.

    Do We Really Need a Security Industry? 2007

  • This is where the IT industry is headed, and when it gets there, there'll be no point in user conferences like Infosec and RSA.

    Do We Really Need a Security Industry? 2007

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.