Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Some of the country’s leading technology companies have committed to investing billions of dollars to strengthen cybersecurity defenses and to train skilled workers, [Read More]
SecurityWeek talks to ISSA International President Candy Alexander about the cybersecurity skills shortage and the organizations' annual survey. [Read More]
The new funding round brings the total raised by the Breach and Attack Simulation (BAS) systems vendor to $79 million. [Read More]
As part of the initiative, the Department of Homeland Security is announcing an additional 500 tentative job offers. [Read More]
The Ransomware Readiness Assessment (RRA) module will help organizations assess whether they can defend and recover from a ransomware attack. [Read More]
Immersive plans to use the new funds to accelerate the delivery of a progressive new Cyber Workforce Optimization platform. [Read More]
Three European Union member nations and three Middle Eastern countries are looking to train personnel in border, customs, maritime and cybersecurity techniques at a cutting-edge U.S.-funded facility in Cyprus that is expected to be ready early next year. [Read More]
ISACA’s State of Cybersecurity 2021 was designed to learn what cybersecurity experts, leaders and practitioners have to say about workforce development, staffing and cybersecurity budgets. [Read More]
A Grambling State University student is about to get Louisiana’s first bachelor’s degree in cybersecurity at a time when data breaches are making headlines. [Read More]
Living Security has raised $14 million in a Series B funding round, which the company says it will use to expand and further develop its human risk management platform. [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Marie Hattar's picture
In order to deliver on the promise of 5G, we need new industry standards for security, testing, and training to proactively combat 5G cyber threats and minimize risks.
Gordon Lawson's picture
For red teams, using an obfuscated network for testing offers the advantage of hiding who is performing the attack and where it is originating, for a more real-life context
Jeff Orloff's picture
Most organizations rely too heavily on their cybersecurity pros to protect them from threats, ignoring the painful reality that human error is by far the most common cause of security breaches.
Jeff Orloff's picture
It’s important to show the effectiveness of training initiatives. Managers want to make sure that they're getting a return on their investment and justify future training budgets requests.
Derek Manky's picture
As we see an increasing number of recent attacks against critical infrastructure – cybersecurity and physical security can be intrinsically linked.
Jeff Orloff's picture
Offering SOC staff professional development opportunities turns out to be a tool for talent retention.
Rob Fry's picture
By taking some lessons from outside our cybersecurity sandbox, we can address some of the significant challenges in cybersecurity.
Gordon Lawson's picture
Everyone is familiar with the three legs of cybersecurity stool: people, processes and technology. But most companies typically invest in just one area – technology.
Derek Manky's picture
With the pandemic creating a massive remote work shift and consequent rises in cyber risk, finding individuals with cybersecurity skills is harder than ever.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.