The cybersecurity skills shortage acts as a root cause for security events

The cybersecurity skills shortage acts as a root cause for security events

New research from ESG and ISSA reveals that a lack of training, inadequate cybersecurity staffing, and business apathy contribute to security events.

11/20/17

Acute cybersecurity skills shortage areas

Acute cybersecurity skills shortage areas

Security analysts/investigators, application security specialists, and cloud security skills top a long list of skills deficits.

11/16/17

Research confirms the cybersecurity skills shortage is an existential threat

Research confirms the cybersecurity skills shortage is an existential threat

ESG research with ISSA shows that organizations don’t have the right levels of cybersecurity personnel, skills and ongoing training to keep up with cyber risk.

11/14/17

The cybersecurity skills shortage impacts security operations

The cybersecurity skills shortage impacts security operations

Large organizations are understaffed and lack the right skills for things such as threat hunting, prioritizing alerts, and forensic investigations.

11/09/17

Identity management to-do list aligns with cybersecurity

Identity management to-do list aligns with cybersecurity

Large organizations want to monitor user activities, move to multi-factor authentication, and get security more involved with IAM decisions.

11/07/17

Endpoint security needs 'efficient efficacy'

Endpoint security needs 'efficient efficacy'

Enterprise organizations want new endpoint security tools that prevent exploits and malware better and streamline operations.

11/02/17

The internet of identities is coming and will bring massive IAM changes

The internet of identities is coming and will bring massive IAM changes

New demands for scale, security and machine learning will support massive proliferation of internet-connected devices.

10/31/17

The push toward comprehensive endpoint security suites

The push toward comprehensive endpoint security suites

Traditional and next-generation vendors offer suites for endpoint protection, detection and response. But what’s needed, and will customers buy?

10/26/17

Best practice: Security operations automation before orchestration

Best practice: Security operations automation before orchestration

Start by automating simple security operations tasks and then proceed with re-engineering and orchestrating processes.

10/24/17

Few people know it's National Cybersecurity Awareness Month. That’s a problem

Few people know it's National Cybersecurity Awareness Month. That’s a problem

National Cybersecurity Awareness Month has failed to gain national, industry or cybersecurity community attention. It’s time to rally around it or kill it.

10/19/17

Trend Micro positioned to take on enterprise security leaders

Trend Micro positioned to take on enterprise security leaders

Trend Micro has the products, ecosystem and strategy to become an enterprise security leader. Now it needs to improve market visibility and get on CISOs’ radar.

10/17/17

How enterprise organizations benefit from SOAPA

How enterprise organizations benefit from SOAPA

Security operations and analytics platform architecture could accelerate technology innovation, ease integration, and enhance the value of existing technologies.

10/12/17

What’s holding back enterprise security technology transformation?

What’s holding back enterprise security technology transformation?

Hype, confusion and technobabble hinder cybersecurity purchasing decisions and ongoing operations.

10/10/17

Cybersecurity technology: Everything is transforming and in play

Cybersecurity technology: Everything is transforming and in play

Changing requirements and constant innovations are making security technology options more confusing.

10/06/17

Splunk steps up its enterprise security game

Splunk steps up its enterprise security game

Amid the user excitement, Splunk made several enterprise security announcements at its annual user conference.

09/29/17

Time to embrace a security management plane in the cloud

Time to embrace a security management plane in the cloud

Cybersecurity professionals should abandon their control freak persona, as a cloud-based security management plane offers many attractive benefits.

09/25/17

How to handle the huge amount of security data we're generating

How to handle the huge amount of security data we're generating

Security telemetry is on the rise, but gaining insight and operationalizing the data remains challenging and many organizations are falling behind.

09/21/17

The 6 phases of adopting cloud security practices

The 6 phases of adopting cloud security practices

Enterprise organizations tend to follow a standard sequence as they secure cloud-based workloads and integrate cloud and existing security controls.

09/19/17

4 ways CISOs can improve security operations, increase ROI

4 ways CISOs can improve security operations, increase ROI

Organizations will spend more on security operations, but CISOs need metrics to demonstrate ROI.

09/11/17

Cybersecurity pros reveal what they think about their organizations

Cybersecurity pros reveal what they think about their organizations

Business managers are engaged, but security operations remain informal, limited and anchored by key personnel.

09/05/17

Load More