Skills and Training

Skills and Training | News, how-tos, features, reviews, and videos

overwhelmed man stressed analytics information overload
audience listens to speaker lecture at a conference presentation

CSO > collaboration / teamwork / empathy

How Microsoft builds empathy between its security and development teams

Ongoing cross-training, threat information sharing, executive support and a strong threat modeling infrastructure helps the company's security and development staff work collaboratively.

vulnerable breach cyberattack hacker

Cybersecurity professionals are no match for cyber-adversaries

In the battle against hackers, cyber-adversaries have an advantage over cyber-defenders, new research from ESG and ISSA finds.

cybersecurity ts

Is the cybersecurity skills shortage getting worse?

New research indicates that things are not improving for filling the demand for cybersecurity skills. The ramifications are widespread.

thumb
video

What are the latest H-1B visa changes? | TECH(talk)

The controversial H-1B visa program is seeing some changes that could smooth the visa application process – and proposed changes that could make it more restrictive. Here's what's going on.

welcome to north dakota sign 42678037784

North Dakota: An innovative and leading cybersecurity state

North Dakota is addressing the cybersecurity skills shortage with policies and programs for government, education, and business.

certification school pencils diversity creative team by evgeny555 getty

Cybersecurity education in the age of acceleration

The cyber threat landscape demands professional development initiatives.

glasses on book study certification skills programmer school by james sutton unsplash

Navigating a challenging cybersecurity skills landscape

As much as tools and technology evolve in the cybersecurity industry, organizations remain reliant on clever, well-trained humans with incisive critical thinking skills to protect themselves from the perilous cyberthreat landscape.

certification education knowledge learning silhouette with graduation cap with abstract technology

8 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall."

women gender program code monitor

Have we doubled the number of women in infosec?

According to a recent (ISC)2 report, women now comprise 20% of cybersecurity workers. But without defining what jobs are being included, it’s unclear whether we’re truly making progress.

01 intro prediction

10 cybersecurity trends to watch for 2019

In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and companies of all sizes in the year ahead.

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

hackathon contest computer competition hacking

How cyber competitions can help fill the cybersecurity talent shortage

The Cyber Security Challenge Masterclass event helps employers find skilled but non-traditional job candidates.

happy employee selects the happiness emoji button to indicate job satisfaction

How to reduce security staff turnover? Focus on culture and people

HM Health Solutions CISO Omar Khawaja reduced security team attrition by focusing on a strong culture and providing effective communication channels to management.

hackathon contest computer competition hacking

Fear and loathing defending ICS security at DoE's CyberForce Competition

Defending critical infrastructure from determined attackers is not an easy task, CSO reporter J.M. Porup learned competing in the Department of Energy's CyberForce Competition 2018, a cyber security training initiative.

broken web app hacker

Learn to play defense by hacking these broken web apps

OWASP's Broken Web Applications Project makes it easy to learn how to hack web applications--a critical skill for web application developers playing defense, junior penetration testers, and security-curious management.

Slacker guy with feet on desk

4 dangerous security assumptions to avoid

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of...

storm disaster recovery disruption rain umbrella tornado challenge weather

Cyber threats fueled by AI: Security's next big challenge

Security has always been an arms race. But the addition of AI is like jumping from tomahawks to Tomahawk missiles.

digital security concept > lock / keyhole / circuits / network connections

5 biggest cybersecurity challenges at smaller organizations

Manual processes, security complexity, and a lack of support from business management plague small and midsize businesses (SMBs).

Load More
You Might Also Like