Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

CybSafe raises $28 million in a Series B funding round led by Evolution Equity Partners. [Read More]
Hoxhunt raises $40 million in Series B funding round led by Level Equity Management, to accelerate growth in new markets. [Read More]
SecurityWeek will host its 2022 Threat Intelligence Summit as a fully immersive virtual event on May 18, 2022. [Read More]
SecurityWeek will host its 2022 Threat Intelligence Summit as a fully immersive virtual event on May 18, 2022. [Read More]
Join this live webinar on April 19th at 2PM ET as we explore a multi-pronged approach to build a vigilant global workforce that reduces risk and increases our confidence in responding to emerging threats. [Read More]
Thousands of participants will respond to a series of simulated cyberattacks that crippled the government, military, and critical infrastructure operations of a fictional country. [Read More]
Hyperfocus and non-linear thinking have clear and obvious benefits to problem solving in cybersecurity. But neurodivergence is the minority, and like all minorities requires accommodation from the majority in order to flourish. [Read More]
PCI Data Security Standard (DSS) v4.0 released to address emerging threats to customer payment information. [Read More]
The three-day cyber exercise, Cyber Storm VIII, included over 2,000 partners from government and private sectors. [Read More]
The military’s involvement with information technology and information warfare dates to before the internet, so it has acquired a lot of knowledge and skills over the years. [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Gordon Lawson's picture
For red teams, using an obfuscated network for testing offers the advantage of hiding who is performing the attack and where it is originating, for a more real-life context
Jeff Orloff's picture
Most organizations rely too heavily on their cybersecurity pros to protect them from threats, ignoring the painful reality that human error is by far the most common cause of security breaches.
Jeff Orloff's picture
It’s important to show the effectiveness of training initiatives. Managers want to make sure that they're getting a return on their investment and justify future training budgets requests.
Derek Manky's picture
As we see an increasing number of recent attacks against critical infrastructure – cybersecurity and physical security can be intrinsically linked.
Jeff Orloff's picture
Offering SOC staff professional development opportunities turns out to be a tool for talent retention.
Rob Fry's picture
By taking some lessons from outside our cybersecurity sandbox, we can address some of the significant challenges in cybersecurity.
Gordon Lawson's picture
Everyone is familiar with the three legs of cybersecurity stool: people, processes and technology. But most companies typically invest in just one area – technology.
Derek Manky's picture
With the pandemic creating a massive remote work shift and consequent rises in cyber risk, finding individuals with cybersecurity skills is harder than ever.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?