Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Security firm Kaspersky Lab will host the 2016 edition of its Security Analyst Summit (SAS) on February 7-11 at the Ritz-Carlton, Abama luxury resort in Tenerife, Spain. [Read More]
A team from Iowa State University was awarded $25,000 for winning the first National Cyber Analyst Challenge, a competition created by Lockheed Martin and Temple University's Institute for Business and Information Technology. [Read More]
Hackers breached the systems of anti-adblocking service PageFair and used the access to deliver malware [Read More]
The National Science Foundation (NSF) announced $74.5 million in research grants to support interdisciplinary cybersecurity research. [Read More]
The US government agencies that defend the nation are in the midst of a charm offensive -- trying to win over the hearts and minds of Silicon Valley's tech workers. [Read More]
Experts warned at a conference in Saudi Arabia of a critical shortage of global specialists trained to confront increasingly malicious cyber security threats. [Read More]
Win prizes and bragging rights by playing in the SecurityWeek Bracket Challenge and making the best predictions in the 2015 Men's NCAA College Basketball Tournament. Register today! [Read More]
Data alone presents a few problems, but many of them emerge from a single misguided view – 
that big data is the answer, not part of the answer. [Read More]
HP Cyber Risk Report 2015 contains more than 70 pages jam packed with data and analysis detailing the threat landscape and how hackers exploit it. [Read More]
President Barack Obama announced a new initiative today to bring more workers into the IT field. [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Mark Hatton's picture
Are we doing enough to ensure that we are cultivating the next generation of cyber professionals? Do we invest enough in education programs that so that students go on to institutions of higher learning with a goal of becoming a cybersecurity expert?
Marc Solomon's picture
Open source is a valuable tool for defenders as they work to close these gaps and to gather greater intelligence about potential threats to make better decisions and take action.
Danelle Au's picture
The most effective CISOs today can’t just be experts in security. Organizations need a versatile security leader that speaks a new language-- one that is a blend of technology and business.
Mark Hatton's picture
The following is a list of questions that I recommend everyone ask security vendors as an initial filter.
Chris Hinkley's picture
Without the internal and external safeguards working in conjunction, your vulnerability will spike and your performance will suffer as a by-product -- two things you can’t afford to have happen.
Matthew Stern's picture
Successful conduct of military operations requires a unit’s clear understanding of the battle space it controls and its “area of operations”. This includes not only the terrain of the battlefield but also the capabilities, motives, and determination of the enemy they face.
Jon-Louis Heimerl's picture
In a perfect world, we would not stress this awareness for one month only. Awareness should be a constant, ongoing effort.
Chris Poulin's picture
Security should be a fascinating, dynamic, and creative pursuit. I say have fun, be creative, be criminal in your thoughts, but not your actions. The black hats who have you in their targets are having a blast.
Jon-Louis Heimerl's picture
External attacks are not our only worry. Most security nuts have been saying for years that our biggest threat is not external, but rather the "Internal Threat." I will take that a step further and say that one of the biggest threats that we face is the "oops".
Oliver Rochford's picture
Oliver makes the case for why the way that security awareness training is often approached is flawed. But if done in the right way, Security Awareness Training can provide a lot of value and benefit the security posture greatly.