

Kristin Burnham
Kristin Burnham is a reporter and editor covering IT leadership, business technology, and online privacy and security. Follow her on Twitter: @kmburnham.

4 infosec hiring tips to attract top talent
Top-notch security pros are hard to find, leaving companies struggling to fill positions. Here’s what businesses need to change to gain a competitive edge.

5 ways to kickstart your infosec job search in 2016
You’re questioning your job—the company, your responsibilities, your salary and more—but is it time to move on?

Infosec jobs: 5 Ways to score an ace recruiter
Working with recruiters who specialize in placing security professionals can give you an advantage in your job search. Here’s how to spot the great ones.

Infosec jobs: Use keywords to boost your LinkedIn ranking
Hiring experts share the keywords you must use to rise to the top of LinkedIn searches for security professionals.

4 Interview questions for data security analysts
Data security analysts are a hot commodity with a rising salary. Here are four interview questions you can expect hiring managers to ask, plus tips to answer them.

How (and why) to start a bug bounty program
Bug bounty programs are a cost-efficient way to fortify your systems. Here’s how GitHub launched theirs, plus tips to get started.

The 4 most insecure areas of online behavior
When it comes to online security, experts and users don’t always agree on the most effective ways to stay safe.

9 reasons why users still struggle with online security
How secure are you?Image by Flickr: amenclinicsphotos acWhen it comes to online security, experts and users don’t always agree on the most effective ways to stay safe, according to a new report from Google.The company surveyed 294...

Privacy settings smackdown: Facebook vs. Twitter vs. LinkedIn vs. Google+
Not all privacy settings are created equalImage by ITworld/Stephen SauerNearly three-quarters of people with access to the Internet use social networking sites, a number that has skyrocketed since early 2005, according to the Pew...

How the top social networks compare on privacy -- in one handy chart
Not all privacy settings are created equal. Here’s an in-depth look at what Facebook, Twitter, LinkedIn and Google+ offer users.
Twitter Plans Two-Step Authentication to Prevent Hacks
The Associated Press' Twitter account was compromised yesterday due to what appears to be a successful phishing attack that allowed the hacker to use APs Twitter account to publish a tweet that read "Breaking: Two Explosions in the...
-
Analyst Report
Sponsored -
White Paper
-
White Paper
-
White Paper
-
Video/Webcast
Sponsored