InfoSec Staffing

InfoSec Staffing news, information, and how-to advice

women conference
businessman meditating

2014 11 21 cso value of time

Successful leaders use the value of time to boost security team results

Make better decisions and prioritize the right efforts by understanding and using the value of time to lead a successful security team

training

Building our cyber workforce (part 2 of 2)

In part 2 of this look at growing our cyber workforce, let's address the IT Security staff, executive leadership, suppliers, customers and also consider how we might engage the wider community.

mobile security

5 steps to more mobile-security-savvy employees

It takes more than policies and penalties to make your workers smart about mobile security. Here’s how to identify and correct problem behaviors in your organization that can leave your corporate data vulnerable.

Cyber Workers

Building our cyber workforce (part 1 of 2)

There is a skills gap in cybersecurity that has led to hundreds of thousands of unfilled jobs in the US alone. The number of new job openings is estimated to continue to grow at a rate of some 10 to 12 percent per year, or roughly...

dip

What happens when enterprises promote employees with low security IQs?

Enterprise bi-polar security disorder: promote employees with low security IQs up the ladder, then beat them down when they exhibit risky behavior.

Security certification

Where to find security certifications

Some say they are essential to a successful security career. Others argue they are an outdated concept and a waste of time. Despite the debate, here are 10 places to further learn about the security trade and the certifications...

business piggy bank

For big raises in IT, look to mobile, security, big data

More women will enter the technology workforce in the coming years as they use IT jobs to land business positions, a report said

standing out

5 non-traditional hiring tips for InfoSec

The majority of companies surveyed – 70 percent – says their IT security departments were understaffed.

stem students

The Paradox of STEM Training

Recent statistics seem to point to an overabundance of STEM graduates, and yet there is negative unemployment in some tech careers. Why the discrepancy between supply and demand?

Microsoft's Nadella backtracks after comments on women pay lead to protests

Satya Nadella later said he had been "inarticulate"

we are hiring sign 155397417

States worry about ability to hire IT security pros

The biggest challenges are money -- and not enough people in the pool.

jobs

Why CSO pay is too low in San Francisco, New York

Among six major U.S. cities, CSOs are paid the most in San Francisco and New York, but factoring in the cost of living makes Denver and Chicago the best bang-for-the-buck places.

security officer ciso

Why your company needs both a CIO and a CISO

Information security isn't a luxury these days. It's a necessity. Companies that don't (or won't) pay security the attention it deserves risk joining a list that includes the likes of Target and Home Depot. It's time to hire a CISO...

female ninja

Myths and truths about employing women in Infosec

Lisa Myers breaks down the truths and the fallacies behind women in security careers.

careers 2

Pay up for talent? Is there a security salary disconnect?

Demand for security pros has never been higher, so why are salaries flat?

Take our annual State of the CSO survey!

CSO is conducting its annual “State of the CSO” survey with the objective of defining the security agenda for the coming year as the role of the security professional continues to evolve in today’s business climate

swissknife

Five CISO skills critical to your success in the next five years

The skills security pros need to be honing today in order to thrive in the years ahead

nsa sign

The case for taking a government cyber job: 7 recommendations to consider

Cyber jobs are a hot topic right now for most age groups in America. Typical questions include: Which schools, programs and classes offer the best value for money? What certifications are needed to get into cybersecurity? Are public...

Load More