Searching for unicorns: Managing expectations to find cybersecurity talent

Searching for unicorns: Managing expectations to find cybersecurity talent

Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people.

Vulnerability vs. risk: Knowing the difference improves security

Vulnerability vs. risk: Knowing the difference improves security

Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks.

What the Equifax breach means to me — an end user perspective

Recovery and resiliency or apathy. Which will prevail now that most everyone's PII has been exposed in the Equifax data breach?

Abandoned mobile apps, domain names raise information security risks

Abandoned mobile apps, domain names raise information security risks

When app creators abandon domains for bigger, better deals, what happens to all the app-specific data?

Security chatbot empowers junior analysts, helps fill cybersecurity gap

Security chatbot empowers junior analysts, helps fill cybersecurity gap

Endgame's Artemis eliminate syntax or query language, allowing junior analysts to communicate with the network more intuitively to find security issues.

Enterprise security needs a Mother of Dragons to keep attackers out

Enterprise security needs a Mother of Dragons to keep attackers out

Some Game of Thrones defense strategies you can apply to your organization's cybersecurity strategy

Women in security: Stand your ground against harmful gender stereotypes

Women in security: Stand your ground against harmful gender stereotypes

Words and actions matter as much as technical skills in confronting diversity issues and gender stereotypes in the workplace.

What's the ROI on attribute-based access control?

What's the ROI on attribute-based access control?

Despite the predicted growth of attribute-based access control (ABAC), misconceptions about it leave decision makers concerned about ROI

Closing the IT and cybersecurity skills gap with programming games

Closing the IT and cybersecurity skills gap with programming games

New board games that teach code through concepts may help narrow the skills gap by making coding fun for all ages.

Security and education in the wake of WannaCry, Petya

Security and education in the wake of WannaCry, Petya

To prevent from becoming victims of cyber attacks like WannaCry, enterprises should regularly back up data, patch software and use automated security services.

Can computer science education be fun?

Games that focus on concepts over programming languages teach students to think like a computer while having a little fun.

New reality of ransomware attacks spikes FUD in cybersecurity

New reality of ransomware attacks spikes FUD in cybersecurity

Cyber attacks and ransomware are in the news, raising fear of a digital Pearl Harbor.

6 ways security pros unwittingly compromise enterprise security

6 ways security pros unwittingly compromise enterprise security

Overwhelmed and eager to please, security professionals sometimes cut corners and take risks, unwittingly compromising enterprise security.

Outside IT, few aware of projected skills gap to impact security by 2019

Teaching computer science is a first step toward building the next cybersecurity workforce

Is cell phone spoofing a mobile security risk [or just annoying]?

Sprint responds to a customer's complaint of mobile phone calls and text messages from unknown callers. Here's what the carrier offers for advice.

Make better security buying decisions with use cases

Make better security buying decisions with use cases

Know your risk, then look to use cases to understand what a security product actually does before you invest in anything.

We can't accept election hacking as a new normal

We can't accept election hacking as a new normal

As the investigations into whether Russian hackers influenced the 2016 Presidential election in the US continue, the rest of the world prepares for the new normal of election hacking.

Mining the Minecraft generation

Mining the Minecraft generation

New ways to approach and fill the jobs skills gap

Learning from the ROI of WannaCry

Learning from the ROI of WannaCry

What the earnings indicate about enterprise security practices and unknown future attacks.

Researchers and defenders needed in IIoT

Strategies to overcome the complexity of patching vulnerabilities in critical infrastructure

Load More
Top Blog Posts