Careers

Careers | News, how-tos, features, reviews, and videos

learn basics of ethical hacking

What is ethical hacking? How to get paid to break into computers

Ethical hacking is legally breaking into computers and devices to test an organization's defenses. Here’s what ethical hacking entails and the certifications and training you need to become an ethical hacker.

private public hybrid cloud technology sign

Bruce Schneier takes his pitch for public-interest security to RSA Conference

Bruce Schneier's new all-day track at the RSA Conference explores idea that security pros, like lawyers, should be expected to engage in a certain amount of pro bono work.

rules rulebook compliance regulation by dana getty

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook.

hackathon students code programmer devops certification by rawpixel unsplash

OSCP cheating allegations a reminder to verify hacking skills when hiring

A former student’s claim of widespread cheating on the OSCP exam underscores need to test security job candidates.

abstract arrows direction process magnifying glass search investigate

What is digital forensics? And how to land a job in this hot field

Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in...

hackathon contest computer competition hacking

How cyber competitions can help fill the cybersecurity talent shortage

The Cyber Security Challenge Masterclass event helps employers find skilled but non-traditional job candidates.

intro woman leadership leader executive cityscape vision

What is a CISO? Responsibilities and requirements for this vital leadership role

The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.

cybersecurity skills and talent shortage

The cybersecurity skills shortage is getting worse

More than half of organizations report a “problematic shortage” of cybersecurity skills, and there is no end in sight.

happy employee selects the happiness emoji button to indicate job satisfaction

How to reduce security staff turnover? Focus on culture and people

HM Health Solutions CISO Omar Khawaja reduced security team attrition by focusing on a strong culture and providing effective communication channels to management.

keys / locks / security

Career advice: Good enough security trumps best security

The realization that most of the world doesn’t want the best security will help you advance in your security career.

sequence 01.00 01 56 13.still001
video

CIO Leadership Live with Cathie Kozik, CIO at PSAV | Ep 13

In this episode, host Maryfran Johnson talks with Cathie Kozik, senior vice president and CIO at PSAV, an events space provider, about aligning tech projects to business goals, tapping into employees for innovative ideas and using...

template 2.00 00 03 10.still006
video

IDG CMO Perspectives: Gil Levonai, Chief Markerting Officer, Zerto

Gil Levonai did not follow the typical marketer’s path to his current role as CMO of Zerto. Gil has a degree in aeronautical engineering and spent his early career as a software project manager before pivoting to the marketing...

template c100.00 01 50 13.still001
video

7 steps to becoming a thought leader

Learn how to help your career, your organization and the IT community by sharing your expert knowledge with others.

1 intro security executive thinking woman face binary

12 things every IT security professional should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

frustrated computer user

Why burnout happens in Information Security

Burnout happens a lot in the information security field because we put the professionals responsible for it in positions where they are set up to fail. To fix this, we need to stop treating security as an option or hindrance, and let...

Facebook / network connections / privacy / security / breach / wide-eyed fear

Does Facebook even need a CSO?

Maybe not, says Twitter’s former CISO, but there are risks with Facebook's move from a centralized to a distributed security model in the wake of Alex Stamos's departure.

niall browne domo

CSO Spotlight: Niall Browne, Domo

For Browne, the most important aspect of the CISO's job is understanding that the two most important people in information security are the customer and the hacker.

nasrin rezai general electric

CSO Spotlight: Nasrin Rexai, General Electric

The first female CISO at GE, Nasrin Rexai, stresses how important it is to know who you are, to lead according to your value system, and to think before your respond.

CSO Spotlight Q&A > Tracy Reinhold, Everbridge

CSO Spotlight: Tracy Reinhold, Everbridge

How a successful career in the FBI along with the events of 9/11 put Tracy Reinhold on the path to a career in cybersecurity.

template c100.00 00 14 06.still001
video

What is a business analyst? A key role for business-IT efficiency

Business analyst help guide businesses in improving processes, products, services and software through data analysis. These agile workers straddle the line between IT and the business to help bridge the gap and improve efficiency.

Load More
You Might Also Like