Hiring
Hiring | News, how-tos, features, reviews, and videos
Making security a more welcoming field for women
Job postings that suggest a frat house mindset, work-life imbalance, and pay gaps are among the areas companies should focus on if they want to hire and keep more women cybersecurity professionals.
TIAA boosts cybersecurity talent strategy with university partnership
CISO Tim Byrd teams up with New York University Tandon School of Engineering to create a new educational pathway for TIAA employees.
Diversity in cybersecurity: Barriers and opportunities for women and minorities
Women and minorities interested in cybersecurity face headwinds. Here’s a look at the challenges they face and what can be done.
8 top ethical hacking certifications employers value
If you're looking for a job as a penetration tester, these certs will help you demonstrate your hacking skills and your commitment to the field.
video
Closing the skills gap with smarter cybersecurity hiring and team development
With more than 3 million cybersecurity roles estimated to be unfilled across the globe, security leaders must evolve their hiring and team development strategies. Learn what a smarter approach to recruitment and retention will mean...
Seven strategies for building a great security team
The dangers of a dysfunctional security team are easy to imagine, ranging from difficulty attracting and retaining talent to putting your organization at risk. These seven steps can make a world of difference.
8 must-ask security analyst interview questions
These essential interview questions will reveal whether a candidate has the skills and traits needed for this in-demand security role.
7 key data points on the cybersecurity skills shortage
The global cybersecurity skills shortage is as bad as it has ever been, and most organizations are feeling the pinch, new research finds. But cybersecurity professionals have many recommendations for addressing this situation.
CISOs’ 15 top strategic priorities for 2021
Mitigating third-party risk, baking security into the development process, defending against ransomware attacks, keeping pace with digital transformation efforts—these are just a few things that are top-of-mind for CISOs today.
4 things you should know about cybersecurity pros
ESG/ISSA research report reveals that a strong cybersecurity culture really matters.
HSBC CISO champions neurodiversity awareness in cybersecurity
HSBC’s CISO for Asia Pacific Jonathan Scott-Lee discusses his aims as the organization’s ambassador for neurodiversity, the importance of neurodiversity in cybersecurity and cultivating a more neurodiverse technology sector.
STEMatch creates new cybersecurity education and career paths
CSO50 award-winning program STEMatch makes cybersecurity education and careers more accessible thanks to private and public sector support.
CIO Think Tank: Reinventing IT
As companies accelerate out of pandemic disruption, how can IT meet increasing demands — and reap unprecedented benefits? In a series of virtual roundtables, dozens of IT leaders offered key insights about the road ahead.
4 ways COVID-19 has changed security hiring forever
One year in, the COVID-19 pandemic has had significant, and likely permanent, impacts on information security hiring. Here are the changes that experts say are here to stay.
8 new roles today’s security team needs
Demand for cybersecurity professionals remains sky-high. Make sure you're hiring for the right roles.
Tech Primer
What it takes to become an information assurance analyst
This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...
Tech Primer
Fraud prevention: Improving internal controls
Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.
Tech Primer
How to write an information security policy
Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.