Security Articles / Briefings

How to Write a Resume That Gets Results


The topic of resume writing is drawing significant attention these days. An article entitled “Want an Unbeatable Resume? Read These Tips from a Top Recruiter” showed up in Forbes on 8.24.11. A few weeks ago, the article showed up at the top of LinkedIn as a featured article.

As of this moment on 10.21.11, this article has been viewed 99,849 times, shared on Facebook 1,913 times, on LinkedIn 22,300 times, on Twitter 937 times and so on. It appears that resume writing is quite a popular topic in the midst of an unstable job market in an unstable world and rightfully so.

Chief Security Security - 21st century

Baby Boomers are Retiring

As Baby Boomers are leaving the corporate workplace to enjoy their time on the beach, in the mountains and in their RVs traveling across the country, corporate security departments are losing leadership talent more frequently than at any other time in corporate history.

A Global Chief Security Officer recently suggested that in a meeting of financial services CSOs he recently attended, the audience was made up mostly of CSOs who would be retiring in the next one to five years.  He especially noticed the demographics in the room because he is fifty years old and is wondering which of his more senior global CSO peer’s jobs will open up for him to explore for his own career advancement in the not too-distant-future.

Mobile Security

Mobile devices are now a critical aspect of the modern workforce. Now consider that Microsoft Office on mobile devices is nearly as common as using a laptop. The recent News of the World scandal in Britain has increased the focus on mobile device security. Given the realities of the modern day work environment, the use of these devices to access the sensitive data of organizations large and small will continue to grow and mobile applications will proliferate.Researchers have estimated that mobile data usage will grow 12-fold by 2014. According to a Carnegie Mellon University study, 4 in 10 organizations have had mobile devices lost or stolen, and half of those devices contained critical data.

Verbal and Written Communication Skills for Technology Professionals

In high school, math, science and computer classes were easy classes for you. In college, you concentrated on science and math classes and worked through them with ease. Now, you’re in the business world working in a technology related job and all that hard work previously devoted to math and science classes during your educational years is translating into a paycheck. So far so good. But wait! Did anyone ever tell a computer science student when they were in school that verbal and written communication skills would become critically important skills to master in the workplace?

Ease of Resume Delivery

Today, resumes flow into corporate and third party recruiter’s inboxes at a higher volume than in any time in past history. Just two
decades ago, resumes were delivered through fax machines and via US Mail. Today, resume delivery can and does happen with literally
one mouse click. If everybody can and does deliver a resume with one mouse click, you, the job seeker, must do something to make your
resume stand out from the hundreds of resumes employers receive when they post a job on-line.

Cellular Spying

We live in a 24/7/365 connected world. Cell phones have evolved into an essential part of our business and every day social lives. We are on our cell phones all the time – talking, texting and taking photos and videos. Consider the private conversations and information that you routinely share when using your cell phone. How would you feel if someone was listening to every word, reading every text.message or viewing your pictures and videos?

Building Relationships with Highly Specialized Recruiters - Proactively

You buy insurance before you have an accident. You choose a primary doctor when you initiate new health insurance coverage. You identify a dentist before you need a root canal. Isn’t your career important enough to you to proactively identify and promote yourself to recruiters who specialize in recruiting in your skill discipline?

Web Application Security A Hot Information Security Skill Set for 2010

For the past few years, one of the hottest information security job skill sets has been web application security.  Rolling into 2010, demand for web application security and secure software development (SDLC) skills continues at  Employers typically look for two different kinds of web application security professionals.

LinkedIn, How to Use LinkedIn Properly

For the five or so years that I’ve been using LinkedIn as a strategic tool in my business, I’ve read or heard many different points of view regarding the “proper” way to use LinkedIn.  I don’t think there is one proper way to use LinkedIn. I believe there are many different approaches to leveraging the power of LinkedIn.

Cyber Attacks on Businesses

A few studies found that businesses with less than 500 employees actually experience more cyber attacks on average than their larger counterparts. Cyber attackers believe that the bigger the business the more prepared they are to defend against cyber attacks.

11 Steps to Interviewing Success

Someone once suggested that failing to plan is the same as planning to fail.  If you’re fortunate to be chosen for an interview, invest the time to plan your approach. 

Recession scams prey on job-seekers

A quick internet search for ‘recruitment fraud’ produces a surprisingly high number of results,

Pages on official company websites explain that their organizations have been the victims of recruitment fraudsters.

The Security Job Board

This is a recent Q&A discussion between a consultant (Fred) and Jeff Snyder, President of

FRED:  Jeff, what made you decide to turn your into a Security Job Board where companies can directly post jobs?

Security Professionals: Enhance Your Career Prospects by Developing a “Personal Brand”

Can a security professional create a personal brand? “Why SURE!”claims Jeff Snyder and we agree. And while this article from NaSPA’s resident Security Recruiting expert deals prinicpally with people seeking employment or career enhancement in the Security profession, the tips are solid and apply to almost anyone in any profession. Read and heed as Jeff explains how to build your own “personal brand” in order to enhance your chances of gainful employment, in whatever profession
you are seeking

What’s New At

Fred: Hey Jeff, you’re a bit difficult to get on the phone without a scheduled appointment these days.  What’s the story behind your schedule?

BOT Net Threat

A BotNet is a collection of internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. These computers have been compromised or infected with software that allows the computer to be controlled remotely by someone, who is known as the BotMaster.

10 Steps to Technology Employment

You probably don’t have to stretch too far to find someone who has recently lost a job, someone who is concerned about losing a job or perhaps, the person I’m describing is you.

Fake Security Software

The risks of security software or scareware as it has been dubbed is on the rise. Scareware is fake security products that actually installs malicious software on the computer of an unsuspecting user. It is one of most successful malware scams today and is making millions for criminals..

Health Care Emergency - Security Implications

The World Health Organization (WHO) Emergency Committee held its second meeting on April 27, 2009 to discuss the Swine Flu outbreak. The Committee considered all data currently available on confirmed outbreaks of A/H1N1 swine influenza in the United States, Mexico, and Canada.

North Korea says - “U.N. sanctions are a Declaration of War”

North Korea warned the United Nations Security Council on April 7th, 2009 that itwould take "strong steps" if the fifteen nation body took any action in response to Pyongyang's launch of a long-range rocket three days earlier.

Tips for Hiring Security and Disaster Recovery Professionals
By Leo A. Wrobel and Sharon M. Wrobel

Would anyone care to venture a guess as to what two of the most popular topics of interest are for NaSPA members?  While we have not run a scientific study (yet), two topics come up again and again in our interactions with the membership.  The first one is recruiting as it applies to the job market. 

Cyber-Terrorism; Fact or Fiction: By Eric Flis - February 2009

In today’s high tech world society is more reliant than ever on computers, networks and the internet. This is true from the more mundane tasks such as shopping online through to complex IT infrastructures that control a countries power supply through to military IT systems.

CYBER Warriors - February 2009 article from technolytics

Each and every day, each and every hour, cyber attacks are waged against a wide variety of targets on millions of computers and networks around the world. These battles rage twenty-four hours a day, seven days a week each and every day of the year.


Criminals have discovered that the Internet provides new opportunities and multiple benefits for their illicit business. Cyber crime has now exploded and reached epidemic proportions all over the world. Cyber crime techniques will continue to evolve, finding new vulnerabilities in software, applications, and devices as well as exploiting individuals who lack appropriate information security awareness training.

Cyber Threat Advisory: Counterfeit Hardware
By Kevin G. Coleman

Best Buy Digital Photo Frames Ship with Computer Virus. Reported Jan. 2008, the Insignia NS-DPF10A digital photo frames, which connect to PCs via USB, were "contaminated with a computer virus during the manufacturing process" according to a notice posted on the company's website.

Chem-Bio Threat Advisory: Chem-Bio Materials Found
By Kevin G. Coleman

Ricin found in Hotel room. A dangerous toxin called ricin was discovered in a Las Vegas hotel on Friday, February 29th, 2008. In addition, the Anarchist Manual and firearms were also found in motel room with ricin. Ricin is made from castor beans, which were also found in the room along with a powdery substance that field tests indicated ricin.

Cyber Threat Advisory: SilentBanker
By Kevin G. Coleman

This cyber threat has already struck over 400 banks in the U.S. Canada, France, Spain, Ireland, the UK, Finland and Turkey. The malicious code has the ability to get around two-factor authentication and the capability to distribute other Trojan software as well as to update itself. The scale and sophistication of this banking Trojan is worrying, even for someone who sees banking Trojans on a daily basis.

Career Advisor | Do You Have What It Takes to Be a Converged CSO?

By Jeff Snyder           As seen in January 2008 CSO Magazine
When companies decide to combine logical and physical security, one of the first challenges they face is finding a leader who has been exposed to both information security and physical security. Someone has to be put in place to create change. Who is this person? What is his skill set? Where can she be found? Does he or she actually exist?

Career Advisor: The Top Five Reasons CSO Candidates Don't Get Hired
By Jeff Snyder

You worked hard, finished one or more college degrees and maybe even earned multiple security certifications. In your mind, you now qualify to lead the charge on the most technically challenging security issues any industry can place in your path. But wait, you’re stuck at a professional level that is less than your dream job.

Top 10 Cyber Security Issues for 2008
By Kevin G. Coleman

Information technology systems are the underpinning of our economy and nation’s security. Most of these systems rely on the Internet for communications. Security issues abound and many individuals become overwhelmed and have a difficult time assessing those issues which pose the greatest threat.

Job Interviews - A Tool For Espionage

Security Issue: Employees interviewing with outside firms are enticed and often pressured into disclosing sensitive, confidential and in some cases possibly classified information. Sometimes disclosure of even high level information about projects becomes the basis of derivative intelligence.