Searching for unicorns: Managing expectations to find cybersecurity talent

Searching for unicorns: Managing expectations to find cybersecurity talent

Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people.

09/29/2017

Vulnerability vs. risk: Knowing the difference improves security

Vulnerability vs. risk: Knowing the difference improves security

Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks.

09/26/2017

What the Equifax breach means to me — an end user perspective

What the Equifax breach means to me — an end user perspective

Recovery and resiliency or apathy. Which will prevail now that most everyone's PII has been exposed in the Equifax data breach?

09/15/2017

Abandoned mobile apps, domain names raise information security risks

Abandoned mobile apps, domain names raise information security risks

When app creators abandon domains for bigger, better deals, what happens to all the app-specific data?

09/08/2017

Security chatbot empowers junior analysts, helps fill cybersecurity gap

Security chatbot empowers junior analysts, helps fill cybersecurity gap

Endgame's Artemis eliminate syntax or query language, allowing junior analysts to communicate with the network more intuitively to find security issues.

08/31/2017

Enterprise security needs a Mother of Dragons to keep attackers out

Enterprise security needs a Mother of Dragons to keep attackers out

Some Game of Thrones defense strategies you can apply to your organization's cybersecurity strategy

08/25/2017

Women in security: Stand your ground against harmful gender stereotypes

Women in security: Stand your ground against harmful gender stereotypes

Words and actions matter as much as technical skills in confronting diversity issues and gender stereotypes in the workplace.

08/21/2017

Top 5 container mistakes that cause security problems

Top 5 container mistakes that cause security problems

As enterprises increase their adoption of containers, they are also increasing the number of security mistakes they make with the technology.

08/14/2017

What's the ROI on attribute-based access control?

What's the ROI on attribute-based access control?

Despite the predicted growth of attribute-based access control (ABAC), misconceptions about it leave decision makers concerned about ROI

08/07/2017

Closing the IT and cybersecurity skills gap with programming games

Closing the IT and cybersecurity skills gap with programming games

New board games that teach code through concepts may help narrow the skills gap by making coding fun for all ages.

07/26/2017

Security and education in the wake of WannaCry, Petya

Security and education in the wake of WannaCry, Petya

To prevent from becoming victims of cyber attacks like WannaCry, enterprises should regularly back up data, patch software and use automated security services.

07/19/2017

Can computer science education be fun?

Can computer science education be fun?

Games that focus on concepts over programming languages teach students to think like a computer while having a little fun.

07/17/2017

New reality of ransomware attacks spikes FUD in cybersecurity

New reality of ransomware attacks spikes FUD in cybersecurity

Cyber attacks and ransomware are in the news, raising fear of a digital Pearl Harbor.

07/10/2017

6 ways security pros unwittingly compromise enterprise security

6 ways security pros unwittingly compromise enterprise security

Overwhelmed and eager to please, security professionals sometimes cut corners and take risks, unwittingly compromising enterprise security.

06/30/2017

Outside IT, few aware of projected skills gap to impact security by 2019

Outside IT, few aware of projected skills gap to impact security by 2019

Teaching computer science is a first step toward building the next cybersecurity workforce

06/21/2017

Is cell phone spoofing a mobile security risk [or just annoying]?

Is cell phone spoofing a mobile security risk [or just annoying]?

Sprint responds to a customer's complaint of mobile phone calls and text messages from unknown callers. Here's what the carrier offers for advice.

06/19/2017

Make better security buying decisions with use cases

Make better security buying decisions with use cases

Know your risk, then look to use cases to understand what a security product actually does before you invest in anything.

06/16/2017

We can't accept election hacking as a new normal

We can't accept election hacking as a new normal

As the investigations into whether Russian hackers influenced the 2016 Presidential election in the US continue, the rest of the world prepares for the new normal of election hacking.

06/09/2017

Mining the Minecraft generation

Mining the Minecraft generation

New ways to approach and fill the jobs skills gap

05/23/2017

Learning from the ROI of WannaCry

Learning from the ROI of WannaCry

What the earnings indicate about enterprise security practices and unknown future attacks.

05/17/2017

Load More