Stacy Collett

Contributing Writer

Stacy Collett is a contributing writer for Computerworld, CSO, and Network World, covering a variety of security and risk issues.

Four ways to use open data sources to find cybersecurity candidates

Four ways to use open data sources to find cybersecurity candidates

Publicly available data from government and other sources can help you find the right security talent.

4 places to find cybersecurity talent in your own organization

Organizations are missing opportunities to cultivate inside talent who may lack experience but already know the business and have the fundamental skills to succeed in cybersecurity.

How Cisco combats fast-maturing cybercrime networks

How Cisco combats fast-maturing cybercrime networks

As Steve Martino approaches his 10-year anniversary as vice president and CISO at Cisco Systems, his job has morphed from treating security as simply a must-have to it becoming a strategic imperative for the company.

Companies ramp up recruiting veterans as cybersecurity urgency grows

Companies ramp up recruiting veterans as cybersecurity urgency grows

Many veterans have the cybersecurity skills and attitude to be successful in the public sector with the right support.

Making sense of cybersecurity qualifications

Making sense of cybersecurity qualifications

As organizations push for equitable and transparent credentials, several credentialing initiatives are in the works to make cybersecurity credentials easier to understand and classify according to their value.

Five ways the U.S. is educating cybersecurity talent – and what’s still missing

Five ways the U.S. is educating cybersecurity talent – and what’s still missing

It’s no secret that the world is facing a shortage of cybersecurity talent. Many industry analysts agree that the underlying problem is the lack of education in cyber skills – in high schools, colleges, post grad and on the job.

4 places to find cybersecurity talent in your own organization

4 places to find cybersecurity talent in your own organization

Organizations are missing opportunities to cultivate inside talent who may lack experience but already know the business and have the fundamental skills to succeed in cybersecurity.

What it takes to become an information assurance analyst

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

What it takes to become an IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

Why more Chief Strategy and Risk Officers need a seat at the security table

Why more Chief Strategy and Risk Officers need a seat at the security table

For years the evolving role of chief information security officers has increasingly required them to think more like a chief risk or strategy officer and anticipate cyber threats before they happen. Now a perfect storm is brewing that...

Should security pros get special H-1B visa consideration?

Should security pros get special H-1B visa consideration?

The skills, education and experience that would garner additional merit have not been discussed publicly, but some cybersecurity leaders and industry-watchers say that special consideration should be given to H-1B visa applicants with...

CSO50 2017: A step ahead of the threats

CSO50 2017: A step ahead of the threats

The CSO50 awards honor innovative security projects that demonstrate thought leadership and outstanding business value.

CSO50 2017: IACI's neighborhood watch is a new approach to information sharing

CSO50 2017: IACI's neighborhood watch is a new approach to information sharing

The federal government for years has advocated that cyberthreat information-sharing is the key to faster identification and remediation of attacks. The challenge was to make once-taboo information sharing more inviting to the private...

That online job candidate may be carrying a virus

That online job candidate may be carrying a virus

LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by...

Cybersecurity confidence gets a C- . How to improve your grade in 2017

Cybersecurity confidence gets a C- . How to improve your grade in 2017

Many security professionals feel less than certain about their own cyber defenses. Research firm CyberEdge Group and Tenable Network Security asked 700 security practitioners in nine countries and across seven industry verticals about...

Hackers wanted

Hackers wanted

As its ‘bad guy’ stereotype wanes, hacker job postings in the enterprise jump 700% in three years.

Best small to midsized cities to land a cybersecurity job

Best small to midsized cities to land a cybersecurity job

These are the best small to medium-sized cities for landing a job in the security sector, according to CyberSeek, a new data-driven heat map from CompTIA that provides real-time insight on the cybersecurity job market.

Rise of the IoT machines

Rise of the IoT machines

Who is responsible for preventing DDoS attacks involving IoT devices?

Five tips for protecting your brand on social media

Five tips for protecting your brand on social media

This summer, online payment service giant Paypal learned that bad guys had set up a fake Paypal Support page on Twitter, and then monitored the real Paypal Support page for remarks from customers. The bad guys responded to those...

Five social engineering tricks and tactics employees still fall for

Five social engineering tricks and tactics employees still fall for

You’ve trained them. You’ve deployed simulated phishing tests. You’ve reminded your employees countless times with posters and games and emails about avoiding phishing scams. Still, they keep falling for the same ploys they’ve been...

Load More