Jobs news, information, and how-to advice

job fair security
harvard university

oddball tech interview questions

Why CISO is the hardest tech role to fill

CISOs are hard to hire because there are far too few business executives with the right mix of business and technical chops. Also, companies aren’t exactly sure how much they’re willing to pay a CISO.

building a culture of trust and engagement

Is lack of gender diversity in tech really shocking?

Male privilege and its impact on work place diversity and culture in the tech industry

training run

What's in your test, training, and exercise program?

From tabletop to functional test exercises, is running tests in anything other than an actual network really effective?

denver skyline summer 2010 106440331

Universities developing cybersecurity degrees to fill jobs gap

Security practitioners lend a hand in developing course work for cybersecurity program

collaboration meeting talking discussion corporate

What are the traits to become an excellent security analyst

A culture of collaboration creates an opportunity for growth and professional development in one principal analyst at Forrrester Research.

graduation commencement

Top U.S. universities failing at cybersecurity education

Cybercriminals are only getting better at what they do, which means the skills gap is growing between the people who hack and the people who stop them. And universities aren't catching up fast enough: A recent study reveals dismal...

risk management

Risk: The bridge between business and security

What started as her own business as a career consultant, delivered Kristen Davies to the world of security and risk management.

data breach hacker

How to be an ethical hacker

Finding a bug bounty program is a trusted way to build a career as an ethical hacker.

managed security service providers

How MSSPs can address the cybersecurity talent gap

Managed security services providers can help companies struggling to fill security roles.

fear afraid hiding

Getting past the fear of encryption

This useful skill is one that some are able to learn on their own, simply by poking around the OS.

Hottest IT jobs emerging today

Cybersecurity pros should beware of exploding job offers

Tips and insights for cybersecurity job-seekers.

travel brochures

Why you need more than money to get top security talent

David Darrow from CSID explains how to attract and retain security talent in highly competitive markets with something other than money

challenges facing infosec workers

8 things keeping security professionals up at night

As the need for enterprise data and technology grows, it only widens the skills gap for security professionals. That means, security professionals are feeling the pressure to get more done with less.

security hole in fence clouds gap opening

How to be or find a skilled pen tester

Pen testers are and will continue to be in high demand.

bigdata problem thinkstock

5 reasons you need to hire a Chief Privacy Officer

Businesses are increasingly relying on data, but they're overlooking another key aspect of data: privacy. In order to keep up with the growing regulations surrounding data privacy, it may be time to hire a Chief Privacy Officer.

security trust

8 tips for recruiting cybersecurity talent

Finding cybersecurity talent isn't easy, but it's even harder if you use the same methods that work for other IT talent specialties. Here's how to get it right.

itskills training ts

Beyond the basics: The certifications you need based on the path you choose

Turns out that a lot of people have a lot of differing opinions on what education, certifications, and training folks new to security ought to have. This is the third of a three-part series on certifications.


Is curiosity the key to create a pathway for better security talent?

Reflecting on the Leading Security Change panel discussion on creating the pathway for the security talent we crave - and an invitation to act

Load More