InfoSec Staffing

InfoSec Staffing news, information, and how-to advice

1 salary survey intro
office work home

security protection defending shield soldier battle warrior

Study: Firms not ready to respond to complex threats

Only 46 percent of organizations have confidence that their security teams can respond to complex threats, according to a new study by ISACA.

now hiring sign
Q&A

5 keys to hiring security talent

Recruiting IT security professionals can be tough, unless you have a great elevator pitch. The CSO of an insurance company provides advice on telling job candidates a compelling story.

Survey: Infosec pros under increasing pressure, short-staffed

The majority of security professionals, 54 percent, said they were under more pressure in 2014 than the year before, and 84 percent said they needed more staff, according to a report released today

man taking selfie

Six entry-level cybersecurity job seeker failings

Here's how many cybersecurity entry-level job seekers fail to make a great first impression.

job searching akamai

Akamai CSO takes a creative approach to finding security pros

Andy Ellis, chief security officer at Akamai, doesn't try to hire perfect candidates. Here’s why.

job searching

Shortage of security pros worsens

Companies are struggling to hire security pros, which means job options are plentiful for veteran candidates. Cisco estimates a million unfilled security jobs worldwide.

7 warning signs of could-be rogue employees

7 warning signs an employee has gone rogue

Trust and IT go hand in hand. Here are the red flags to watch for before you get burned

millenials

Millennials becoming known as Generation Leaky

Millennials, who will soon become the largest population group in the workforce, bring high expectations for convenience and collaboration from technology, but little apparent concern about security. That's a major problem, experts...

countdown

Five sneaky ways companies are changing employees’ security behavior

Like precocious teenagers, some employees don’t want to be told what to do when it comes to cyber security. Too many rules about what they can and cannot do with technology can lead to bad decisions that inadvertently put company data...

data protection

How to create an effective data security communication plan

There is a need to create value around company data and one way to do this is to ensure that the workforce knows and understands the threats that are out there and the measures that are in place to protect against them.

women conference

Going beyond gender for the agenda

We've all seen tech conference with only male speakers on the agenda. What would it be like to have a conference agenda populated only with women, but not a "women in tech" event? And what can this show us about increasing diversity...

businessman meditating

10 changes you can make to achieve security serenity now!

Some security changes are slow, expensive, and uncertain. Here are 10 of the best security changes that you can make with certainty, most of them with relative ease.

2014 11 21 cso value of time

Successful leaders use the value of time to boost security team results

Make better decisions and prioritize the right efforts by understanding and using the value of time to lead a successful security team

training

Building our cyber workforce (part 2 of 2)

In part 2 of this look at growing our cyber workforce, let's address the IT Security staff, executive leadership, suppliers, customers and also consider how we might engage the wider community.

mobile security

5 steps to more mobile-security-savvy employees

It takes more than policies and penalties to make your workers smart about mobile security. Here’s how to identify and correct problem behaviors in your organization that can leave your corporate data vulnerable.

Cyber Workers

Building our cyber workforce (part 1 of 2)

There is a skills gap in cybersecurity that has led to hundreds of thousands of unfilled jobs in the US alone. The number of new job openings is estimated to continue to grow at a rate of some 10 to 12 percent per year, or roughly...

dip

What happens when enterprises promote employees with low security IQs?

Enterprise bi-polar security disorder: promote employees with low security IQs up the ladder, then beat them down when they exhibit risky behavior.

Security certification

Where to find security certifications

Some say they are essential to a successful security career. Others argue they are an outdated concept and a waste of time. Despite the debate, here are 10 places to further learn about the security trade and the certifications...

Load More