Staff Management
Staff Management | News, how-tos, features, reviews, and videos
How security leaders can effectively manage Gen Z staff
To attract and retain Gen Z professionals CISOs must know what this generation values and their strengths to be an effective part of cybersecurity teams.
Economic headwinds could deepen the cybersecurity skills shortage
Security professionals will remain in high demand, but economic fallout will make hiring even harder.
Veterans bring high-value, real-life experience as potential cybersecurity employees
Veterans come with a range of hard and soft skills acquired during their military service that often dovetail perfectly into a career in cybersecurity.
How Marvel’s Avengers inspire Pinsent Masons CISO to adapt cybersecurity hiring
Pinsent Masons CISO Christian Toon discusses the need to challenge hiring practices to attract and keep cybersecurity talent.
When blaming the user for a security breach is unfair – or just wrong
Training non-tech savvy users to recognize phishing and other credential-based attacks is essential but expecting employees to man the front lines against intrusions is a mistake, experts say. Harmony between staff psychology and...
How remote working impacts security incident reporting
Security teams must update their security incident reporting policies and processes to account for remote work or risk exposure to increased threats.
Offboarding processes pose security risks as job turnover increases: Report
Research from YouGov finds that poor offboarding practices across industries including healthcare and tech are putting companies at risk, including for loss of end-user devices and unauthorized SaaS application use.
5 ways to grow the cybersecurity workforce
The cybersecurity workforce shortage and related skills gap stubbornly persists. Here are five ways to attract talent now.
4 strategy game-changers for finding cybersecurity talent
Some CISOs are shaking up their staffing plans to address the challenges of recruiting, hiring and retaining cybersecurity workers – and finding success in their moves.
How a sex worker became a defense contractor employee -- and an insider threat
An accomplished research scientist manipulated a defense contractor CEO into hiring a prostitute for a technical role. Here's how this insider threat could have been avoided.
6 security analyst job description red flags that make hiring harder
With security professionals in short supply, it pays to ensure your job postings aren’t turning away good candidates. Here are six things experts say to avoid and what to do instead.
How the US DHS develops hard-to-find cybersecurity skills
The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.
6 tips for effective security job postings (and 6 missteps to avoid)
With demand for security professionals outstripping supply, employers need to ensure their job postings hit the mark. Here’s how to write a security job posting that attracts qualified candidates.
Latest Cyberspace Solarium Commission 2.0 Report focuses on cyber workforce
The June 2022 report offers recommendations to the private sector, U.S. Congress, and the federal government to build up the nation's cybersecurity talent pool.
How to stop worrying and love zero trust
If you want to work remotely from home — or stay on the move as a digital nomad — you can thank zero trust for making that possible.
Making security a more welcoming field for women
Job postings that suggest a frat house mindset, work-life imbalance, and pay gaps are among the areas companies should focus on if they want to hire and keep more women cybersecurity professionals.
How WiCyS is taking on security’s image problem
Since 2012, Women in Cybersecurity has been breaking down barriers by building a community focused on recruiting, retaining, and advancing women.
Women in cybersecurity need more than inspiration
Why are there so few women in cybersecurity? Here’s one big reason that hardly anyone talks about: caregiving responsibilities.