Security Experts:

long dotted


The military’s involvement with information technology and information warfare dates to before the internet, so it has acquired a lot of knowledge and skills over the years. [Read More]
ENISA and CERT-EU have released guidance to help CISOs and other decision makers in public and private organizations increase their cyber resilience. [Read More]
SecurityWeek editor-at-large Ryan Naraine looks at the ‘great resignation’ currently upending the U.S. labor market and the possible ramifications for cybersecurity programs big and small. [Read More]
A long-term phishing experiment at a 56,000-employee company ends with a caution around the use of simulated phishing lures in corporate security awareness training exercises. [Read More]
SecurityWeek has announced its official lineup of virtual cybersecurity events for 2022. [Read More]
The U.S. House of Representatives this week passed two bills whose goal is to improve the cybersecurity of small businesses. [Read More]
Marshall University has launched a new academic and research institute that will support cybersecurity-related programs across the campus. [Read More]
There’s a severe shortage of cybersecurity professionals and not enough financial firepower to compete with federal counterparts, global brands and specialized cybersecurity firms. [Read More]
The three-year course will help train future prosecutors and attorneys on handling cybersecurity-related cases. [Read More]
Amazon says it will offer free multi-factor authentication devices for AWS customers and cybersecurity training materials. [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Jeff Orloff's picture
Most organizations rely too heavily on their cybersecurity pros to protect them from threats, ignoring the painful reality that human error is by far the most common cause of security breaches.
Jeff Orloff's picture
It’s important to show the effectiveness of training initiatives. Managers want to make sure that they're getting a return on their investment and justify future training budgets requests.
Derek Manky's picture
As we see an increasing number of recent attacks against critical infrastructure – cybersecurity and physical security can be intrinsically linked.
Jeff Orloff's picture
Offering SOC staff professional development opportunities turns out to be a tool for talent retention.
Rob Fry's picture
By taking some lessons from outside our cybersecurity sandbox, we can address some of the significant challenges in cybersecurity.
Gordon Lawson's picture
Everyone is familiar with the three legs of cybersecurity stool: people, processes and technology. But most companies typically invest in just one area – technology.
Derek Manky's picture
With the pandemic creating a massive remote work shift and consequent rises in cyber risk, finding individuals with cybersecurity skills is harder than ever.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?
Joshua Goldfarb's picture
The time to get serious about metrics is long overdue. It is in this spirit that I offer five helpful tips for building meaningful security metrics.