Staff Management

Staff Management | News, how-tos, features, reviews, and videos

team trust risk gap help assistance challenge
Selecting the right people.

CSO > wolf in sheeps clothing / fraud / identity theft / social engineering

How a sex worker became a defense contractor employee -- and an insider threat

An accomplished research scientist manipulated a defense contractor CEO into hiring a prostitute for a technical role. Here's how this insider threat could have been avoided.

11 reporting incidents alert red flag attention

6 security analyst job description red flags that make hiring harder

With security professionals in short supply, it pays to ensure your job postings aren’t turning away good candidates. Here are six things experts say to avoid and what to do instead.

dhs amanda conley 3x2

How the US DHS develops hard-to-find cybersecurity skills

The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.

Recruiter attracts leads  >  Using a horseshoe magnet on a group of figurines.

6 tips for effective security job postings (and 6 missteps to avoid)

With demand for security professionals outstripping supply, employers need to ensure their job postings hit the mark. Here’s how to write a security job posting that attracts qualified candidates.

Intelligent workspaces - Redefining the future of work

Latest Cyberspace Solarium Commission 2.0 Report focuses on cyber workforce

The June 2022 report offers recommendations to the private sector, U.S. Congress, and the federal government to build up the nation's cybersecurity talent pool.

12 zero trust

How to stop worrying and love zero trust

If you want to work remotely from home — or stay on the move as a digital nomad — you can thank zero trust for making that possible.

group of diverse young women with tech background

Making security a more welcoming field for women

Job postings that suggest a frat house mindset, work-life imbalance, and pay gaps are among the areas companies should focus on if they want to hire and keep more women cybersecurity professionals.

Janell Straach

How WiCyS is taking on security’s image problem

Since 2012, Women in Cybersecurity has been breaking down barriers by building a community focused on recruiting, retaining, and advancing women.

woman in an office stairwell near exit signs [by Andrew Loke - CC0 via Unsplash]

Women in cybersecurity need more than inspiration

Why are there so few women in cybersecurity? Here’s one big reason that hardly anyone talks about: caregiving responsibilities.

michaela barnett

How BIC is removing roadblocks for Black security pros

Blacks in Cybersecurity offers a “spinning wheel of resources” to help its members advance their cybersecurity skills and careers, says founder and CEO Michaela Barnett.

thinkstockphotos 499123970 laptop security

Microsoft touts first PCs to ship natively with secure Pluton chip

Along with thwarting malware, the Pluton chip handles BitLocker, Windows Hello, and System Guard and might help prevent physical insider attacks. The technology is also being used in Azure Sphere in the cloud.

A stack of school books sits on a desk, with an apple on top. [Education/Learning]

TIAA boosts cybersecurity talent strategy with university partnership

CISO Tim Byrd teams up with New York University Tandon School of Engineering to create a new educational pathway for TIAA employees.

remote work concept working at home telework picture id1223790327

CISOs, what's in your work-from-home program?

CISOs reveal how their secure remote work strategies are set up for the long haul.

woman working on laptop - close focus, bokeh [by Rawpixel - CC0 via Unsplash]

Diversity in cybersecurity: Barriers and opportunities for women and minorities

Women and minorities interested in cybersecurity face headwinds. Here’s a look at the challenges they face and what can be done.

A virtual checkmark in digital system / standards / quality control / certification / certificates

8 top ethical hacking certifications employers value

If you're looking for a job as a penetration tester, these certs will help you demonstrate your hacking skills and your commitment to the field.

intro crew highly effective teams rowing

Seven strategies for building a great security team

The dangers of a dysfunctional security team are easy to imagine, ranging from difficulty attracting and retaining talent to putting your organization at risk. These seven steps can make a world of difference.

Joanna Burkey, CISO, HP

HP CISO Joanna Burkey: Securing remote workers requires a collaborative approach

New research finds 91% of IT teams feel pressure to compromise cybersecurity for WFH business continuity. HP CISO Joanna Burkey urges security leaders to tackle workforce IT conflicts to secure the remote and hybrid workplace.

intern mentor millennial internship interview women at desk with computer by fizkes getty images

8 must-ask security analyst interview questions

These essential interview questions will reveal whether a candidate has the skills and traits needed for this in-demand security role.

Load More
You Might Also Like