Skills and Training

Skills and Training | News, how-tos, features, reviews, and videos

certification school pencils diversity creative team by evgeny555 getty

Cybersecurity education in the age of acceleration

The cyber threat landscape demands professional development initiatives.

glasses on book study certification skills programmer school by james sutton unsplash

Navigating a challenging cybersecurity skills landscape

As much as tools and technology evolve in the cybersecurity industry, organizations remain reliant on clever, well-trained humans with incisive critical thinking skills to protect themselves from the perilous cyberthreat landscape.

certification education knowledge learning silhouette with graduation cap with abstract technology

8 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall."

women gender program code monitor

Have we doubled the number of women in infosec?

According to a recent (ISC)2 report, women now comprise 20% of cybersecurity workers. But without defining what jobs are being included, it’s unclear whether we’re truly making progress.

01 intro prediction

10 cybersecurity trends to watch for 2019

In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and companies of all sizes in the year ahead.

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

hackathon contest computer competition hacking

How cyber competitions can help fill the cybersecurity talent shortage

The Cyber Security Challenge Masterclass event helps employers find skilled but non-traditional job candidates.

happy employee selects the happiness emoji button to indicate job satisfaction

How to reduce security staff turnover? Focus on culture and people

HM Health Solutions CISO Omar Khawaja reduced security team attrition by focusing on a strong culture and providing effective communication channels to management.

hackathon contest computer competition hacking

Fear and loathing defending ICS security at DoE's CyberForce Competition

Defending critical infrastructure from determined attackers is not an easy task, CSO reporter J.M. Porup learned competing in the Department of Energy's CyberForce Competition 2018, a cyber security training initiative.

broken web app hacker

Learn to play defense by hacking these broken web apps

OWASP's Broken Web Applications Project makes it easy to learn how to hack web applications--a critical skill for web application developers playing defense, junior penetration testers, and security-curious management.

Slacker guy with feet on desk

4 dangerous security assumptions to avoid

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of...

storm disaster recovery disruption rain umbrella tornado challenge weather

Cyber threats fueled by AI: Security's next big challenge

Security has always been an arms race. But the addition of AI is like jumping from tomahawks to Tomahawk missiles.

digital security concept > lock / keyhole / circuits / network connections

5 biggest cybersecurity challenges at smaller organizations

Manual processes, security complexity, and a lack of support from business management plague small and midsize businesses (SMBs).

eliminate insider threats 1

The hidden security problem we all need to know about

If you can anticipate how employees will work, you’ll have a better shot of preemptively preparing for it and protecting your critical data.

1 weakest link broken rusted chain security breach hacked

10 topics every security training program should cover

A thorough end-user education program is a necessary weapon in the battle to protect your perimeter. These 10 topics are the baseline of what to include in an awareness training program.

1 intro security executive thinking woman face binary

12 things every IT security professional should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

Take-aways from Black Hat USA 2018

Black Hat USA 2018 had record crowds, revealed a growing attack surface, and proved we have lots of work ahead.

primary laptop with certificate degree for technology

Top bachelors and masters cybersecurity degree programs

These are some of the best on-campus and online cybersecurity degree programs helping to meet the cybersecurity job demand.

sale 8108 primary image

Refresh your networking skills with this Cisco CCNA training suite

Over 30 hours of digital content across 399 lectures, which can be viewed on your computer or mobile device.

multi tasking running executive race speed internet mobile laptop

Hack like a CISO

Developing the security officers' processes, strategies and techniques for managing their time, resources and teams.

Load More