IT Management

IT Management | News, how-tos, features, reviews, and videos

blame 174280704
secure remote work

Cybersecurity

Offboarding processes pose security risks as job turnover increases: Report

Research from YouGov finds that poor offboarding practices across industries including healthcare and tech are putting companies at risk, including for loss of end-user devices and unauthorized SaaS application use.

3 security vendors

Build a mature approach for better cybersecurity vendor evaluation

Establishing a thorough, well-planned in-house strategy for assessing cybersecurity vendors and their products is a hallmark of an organization’s maturity and can avoid hassles, headaches, and unnecessary expense.

team trust risk gap help assistance challenge

5 ways to grow the cybersecurity workforce

The cybersecurity workforce shortage and related skills gap stubbornly persists. Here are five ways to attract talent now.

Selecting the right people.

4 strategy game-changers for finding cybersecurity talent

Some CISOs are shaking up their staffing plans to address the challenges of recruiting, hiring and retaining cybersecurity workers – and finding success in their moves.

p1200740

Google updates Chronicle with enhanced threat detection

Google Cloud’s Chronicle will now offer curated threat detection as part of its analytics initiative in the Chronicle SecOps suite.

CSO > wolf in sheeps clothing / fraud / identity theft / social engineering

How a sex worker became a defense contractor employee -- and an insider threat

An accomplished research scientist manipulated a defense contractor CEO into hiring a prostitute for a technical role. Here's how this insider threat could have been avoided.

11 reporting incidents alert red flag attention

6 security analyst job description red flags that make hiring harder

With security professionals in short supply, it pays to ensure your job postings aren’t turning away good candidates. Here are six things experts say to avoid and what to do instead.

An abstract network of currency symbols surrounds a tiny globe that sits on the based of a laptop.

5 key considerations for your 2023 cybersecurity budget planning

An evolving threat landscape, regulatory requirement changes, and increases in cyber insurance are among leading factors that will impact next year's security budget.

Consulting firms jump on the Zero Trust bandwagon

Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.

young woman holding contract and broken chain

Locked in: How long is too long for security vendor contracts?

Security moves fast. Here’s how experts say you should find the right balance among agility, stability, and price.

dhs amanda conley 3x2

How the US DHS develops hard-to-find cybersecurity skills

The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.

cisco logo fit

Cisco reports vulnerabilities in products including email and web manager

New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.

Recruiter attracts leads  >  Using a horseshoe magnet on a group of figurines.

6 tips for effective security job postings (and 6 missteps to avoid)

With demand for security professionals outstripping supply, employers need to ensure their job postings hit the mark. Here’s how to write a security job posting that attracts qualified candidates.

Intelligent workspaces - Redefining the future of work

Latest Cyberspace Solarium Commission 2.0 Report focuses on cyber workforce

The June 2022 report offers recommendations to the private sector, U.S. Congress, and the federal government to build up the nation's cybersecurity talent pool.

12 zero trust

How to stop worrying and love zero trust

If you want to work remotely from home — or stay on the move as a digital nomad — you can thank zero trust for making that possible.

group of diverse young women with tech background

Making security a more welcoming field for women

Job postings that suggest a frat house mindset, work-life imbalance, and pay gaps are among the areas companies should focus on if they want to hire and keep more women cybersecurity professionals.

Janell Straach

How WiCyS is taking on security’s image problem

Since 2012, Women in Cybersecurity has been breaking down barriers by building a community focused on recruiting, retaining, and advancing women.

woman in an office stairwell near exit signs [by Andrew Loke - CC0 via Unsplash]

Women in cybersecurity need more than inspiration

Why are there so few women in cybersecurity? Here’s one big reason that hardly anyone talks about: caregiving responsibilities.

Load More
You Might Also Like