

Stacy Collett
Contributing Writer
Stacy Collett is a contributing writer for Computerworld, CSO, and Network World, covering a variety of security and risk issues.

Five new threats to your mobile security
Cyber criminals are stepping up their attacks on mobile devices with new weapons and variations on old ones.
5 reasons to take a fresh look at your security policy
Evolving ransomware and DDoS attacks, new technology such as IoT, and changing user behavior are all good reasons to revise your security policy.

Four ways to use open data sources to find cybersecurity candidates
Publicly available data from government and other sources can help you find the right security talent.

How Cisco combats fast-maturing cybercrime networks
As Steve Martino approaches his 10-year anniversary as vice president and CISO at Cisco Systems, his job has morphed from treating security as simply a must-have to it becoming a strategic imperative for the company.

Companies ramp up recruiting veterans as cybersecurity urgency grows
Many veterans have the cybersecurity skills and attitude to be successful in the public sector with the right support.

Making sense of cybersecurity qualifications
As organizations push for equitable and transparent credentials, several credentialing initiatives are in the works to make cybersecurity credentials easier to understand and classify according to their value.

Five ways the U.S. is educating cybersecurity talent – and what’s still missing
It’s no secret that the world is facing a shortage of cybersecurity talent. Many industry analysts agree that the underlying problem is the lack of education in cyber skills – in high schools, colleges, post grad and on the job.

4 places to find cybersecurity talent in your own organization
Organizations are missing opportunities to cultivate inside talent who may lack experience but already know the business and have the fundamental skills to succeed in cybersecurity.

What it takes to become an information assurance analyst
This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

What it takes to become an IT security engineer
The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

Why more Chief Strategy and Risk Officers need a seat at the security table
For years the evolving role of chief information security officers has increasingly required them to think more like a chief risk or strategy officer and anticipate cyber threats before they happen. Now a perfect storm is brewing that...

Should security pros get special H-1B visa consideration?
The skills, education and experience that would garner additional merit have not been discussed publicly, but some cybersecurity leaders and industry-watchers say that special consideration should be given to H-1B visa applicants with...
CSO50 2017: A step ahead of the threats
The CSO50 awards honor innovative security projects that demonstrate thought leadership and outstanding business value.
CSO50 2017: IACI's neighborhood watch is a new approach to information sharing
The federal government for years has advocated that cyberthreat information-sharing is the key to faster identification and remediation of attacks. The challenge was to make once-taboo information sharing more inviting to the private...

That online job candidate may be carrying a virus
LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by...
Cybersecurity confidence gets a C- . How to improve your grade in 2017
Many security professionals feel less than certain about their own cyber defenses. Research firm CyberEdge Group and Tenable Network Security asked 700 security practitioners in nine countries and across seven industry verticals about...

Hackers wanted
As its ‘bad guy’ stereotype wanes, hacker job postings in the enterprise jump 700% in three years.

Five tips for protecting your brand on social media
This summer, online payment service giant Paypal learned that bad guys had set up a fake Paypal Support page on Twitter, and then monitored the real Paypal Support page for remarks from customers. The bad guys responded to those...