Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

U.S. FERC and NERC release a report outlining cyber incident response and recovery best practices for electric utilities. [Read More]
CISA has launched the Cyber Career Pathways Tool, which aims to lay out a career path for current and future cybersecurity professionals. [Read More]
Information security training and certification provider Offensive Security this week announced the acquisition of VulnHub, an open-source catalog of security training resources. [Read More]
Cybersecurity training company RangeForce raises $16 million in a Series A funding round. [Read More]
SecurityWeek’s Enterprise Lockdown will allow attendees from around the world to immerse themselves in a virtual world to learn about and discuss the latest cybersecurity threats and challenges facing enterprise organizations. [Read More]
New rules require critical information infrastructure operators in China to conduct cybersecurity reviews when purchasing tech products and services. [Read More]
Kaspersky has teamed up with SecurityWeek for a three-day virtual event where researchers and other industry professionals will discuss malware, exploits, threat hunting, and other interesting topics. [Read More]
The GAO has analyzed the Pentagon’s cyber hygiene initiatives and found that they are incomplete and in some cases no one is keeping track of their progress. [Read More]
SecurityWeek announced the launch of Security Summits, a new virtual event series designed to allow participants from around the globe to immerse themselves in a virtual environment to discuss the latest cybersecurity threats and challenges facing enterprise organizations. [Read More]
When state election officials gathered ahead of the last presidential election, major topics were voter registration, identity theft and ballot design. This year, the main theme is election security. [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Gordon Lawson's picture
Everyone is familiar with the three legs of cybersecurity stool: people, processes and technology. But most companies typically invest in just one area – technology.
Derek Manky's picture
With the pandemic creating a massive remote work shift and consequent rises in cyber risk, finding individuals with cybersecurity skills is harder than ever.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?
Joshua Goldfarb's picture
The time to get serious about metrics is long overdue. It is in this spirit that I offer five helpful tips for building meaningful security metrics.
Stan Engelbrecht's picture
Here are a few observations from my time at RSAC 2019 about SOAR and the cybersecurity world at large.
Torsten George's picture
Cyber attackers long ago figured out that the easiest way for them to gain access to sensitive data is by compromising an end user’s identity and credentials.
Ashley Arbuckle's picture
We’ve seen an evolution from more traditional simulation exercises that use a Red Team to identify vulnerabilities and launch mock attacks and a Blue Team to detect and respond to attacks, to Purple Teaming exercises.
Michael Moniz's picture
To be an outstanding cybersecurity professional, you need to think outside of the box, be intellectually curious, self-sufficient and collaborative.
Joshua Goldfarb's picture
Writing and documenting aren’t the most exciting activities. But they have tremendous potential, both in improving security operations and incident response, as well as in opening up a constructive dialogue.