IT Management

IT Management | News, how-tos, features, reviews, and videos

cisco logo fit
Recruiter attracts leads  >  Using a horseshoe magnet on a group of figurines.

Intelligent workspaces - Redefining the future of work

Latest Cyberspace Solarium Commission 2.0 Report focuses on cyber workforce

The June 2022 report offers recommendations to the private sector, U.S. Congress, and the federal government to build up the nation's cybersecurity talent pool.

12 zero trust

How to stop worrying and love zero trust

If you want to work remotely from home — or stay on the move as a digital nomad — you can thank zero trust for making that possible.

group of diverse young women with tech background

Making security a more welcoming field for women

Job postings that suggest a frat house mindset, work-life imbalance, and pay gaps are among the areas companies should focus on if they want to hire and keep more women cybersecurity professionals.

Janell Straach

How WiCyS is taking on security’s image problem

Since 2012, Women in Cybersecurity has been breaking down barriers by building a community focused on recruiting, retaining, and advancing women.

woman in an office stairwell near exit signs [by Andrew Loke - CC0 via Unsplash]

Women in cybersecurity need more than inspiration

Why are there so few women in cybersecurity? Here’s one big reason that hardly anyone talks about: caregiving responsibilities.

csea22 002 thumb
video

CSO Executive Sessions / ASEAN: Steven Sim on people management

Steven Sim, Global CISO at PSA International and winner of the CSO30 ASEAN 2021 Awards, joins Xiou Ann Lim for this CSO Executive Sessions interview. They will discuss how job applicants in cybersecurity can stand out, what types of...

michaela barnett

How BIC is removing roadblocks for Black security pros

Blacks in Cybersecurity offers a “spinning wheel of resources” to help its members advance their cybersecurity skills and careers, says founder and CEO Michaela Barnett.

thinkstockphotos 499123970 laptop security

Microsoft touts first PCs to ship natively with secure Pluton chip

Along with thwarting malware, the Pluton chip handles BitLocker, Windows Hello, and System Guard and might help prevent physical insider attacks. The technology is also being used in Azure Sphere in the cloud.

A stack of school books sits on a desk, with an apple on top. [Education/Learning]

TIAA boosts cybersecurity talent strategy with university partnership

CISO Tim Byrd teams up with New York University Tandon School of Engineering to create a new educational pathway for TIAA employees.

remote work concept working at home telework picture id1223790327

CISOs, what's in your work-from-home program?

CISOs reveal how their secure remote work strategies are set up for the long haul.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

woman working on laptop - close focus, bokeh [by Rawpixel - CC0 via Unsplash]

Diversity in cybersecurity: Barriers and opportunities for women and minorities

Women and minorities interested in cybersecurity face headwinds. Here’s a look at the challenges they face and what can be done.

currency / money / coins

Cybersecurity spending trends for 2022: Investing in the future

As security budgets continue to rise, where is the money going? Recent surveys offer insight into CISO spending for the year ahead.

A virtual checkmark in digital system / standards / quality control / certification / certificates

8 top ethical hacking certifications employers value

If you're looking for a job as a penetration tester, these certs will help you demonstrate your hacking skills and your commitment to the field.

intro crew highly effective teams rowing

Seven strategies for building a great security team

The dangers of a dysfunctional security team are easy to imagine, ranging from difficulty attracting and retaining talent to putting your organization at risk. These seven steps can make a world of difference.

Joanna Burkey, CISO, HP

HP CISO Joanna Burkey: Securing remote workers requires a collaborative approach

New research finds 91% of IT teams feel pressure to compromise cybersecurity for WFH business continuity. HP CISO Joanna Burkey urges security leaders to tackle workforce IT conflicts to secure the remote and hybrid workplace.

intern mentor millennial internship interview women at desk with computer by fizkes getty images

8 must-ask security analyst interview questions

These essential interview questions will reveal whether a candidate has the skills and traits needed for this in-demand security role.

programmer certification skills code devops glasses student by kevin unsplash

7 key data points on the cybersecurity skills shortage

The global cybersecurity skills shortage is as bad as it has ever been, and most organizations are feeling the pinch, new research finds. But cybersecurity professionals have many recommendations for addressing this situation.

Load More
You Might Also Like