Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

"Our society has not yet embraced cybersecurity as a civilization-defining competency, yet it is exactly central to our capacity to function in this massively technological age," ProtectWise CTO Gene Stevens told SecurityWeek. [Read More]
Security professionals looking to demonstrate and validate their knowledge of how to secure the Amazon Web Services (AWS) platform can now do so by taking the new AWS Certified Security – Specialty exam. [Read More]
Slack releases goSDL, an open source secure development lifecycle (SDL) tool designed to provide developers a tailored security checklist for their projects [Read More]
NATO’s Locked Shields 2018 exercise tested the skills of cyber defenders from 30 countries in protecting IT systems and critical infrastructure [Read More]
Understanding why Israel produces so many cybersecurity firms starts with understanding the converyor belt of talent that 8200 produces. [Read More]
Thirty-five percent of CISOs in the financial sector consider staff training to be the top priority for cyber defense. Twenty-five percent prioritize infrastructure upgrades and network defense. [Read More]
Insurance companies and non-profit organizations are most likely to fall for phishing attacks, according to a study of 6 million users conducted by KnowBe4 [Read More]
Study conducted by Accenture and AMA shows that a majority of physicians in the US have experienced a cybersecurity incident, including phishing, malware and inappropriate access by insiders [Read More]
DigiCert addresses the concerns raised by Mozilla and others regarding its acquisition of Symantec’s certificate business [Read More]
Webroot buys security awareness training company Securecast to offer a security awareness platform to MSPs [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Torsten George's picture
Cyber attackers long ago figured out that the easiest way for them to gain access to sensitive data is by compromising an end user’s identity and credentials.
Ashley Arbuckle's picture
We’ve seen an evolution from more traditional simulation exercises that use a Red Team to identify vulnerabilities and launch mock attacks and a Blue Team to detect and respond to attacks, to Purple Teaming exercises.
Michael Moniz's picture
To be an outstanding cybersecurity professional, you need to think outside of the box, be intellectually curious, self-sufficient and collaborative.
Joshua Goldfarb's picture
Writing and documenting aren’t the most exciting activities. But they have tremendous potential, both in improving security operations and incident response, as well as in opening up a constructive dialogue.
Travis Greene's picture
Attended by roughly 40,000 people, RSA Conference 2016 was the biggest ever. Here are some observations on security trends observed at the event that took place last week at the conference.
Alastair Paterson's picture
Cyber Threat Intelligence (CTI) is critical for organizations that want to gain a comprehensive, tailored and relevant view of the potential threats and types of attackers that could be targeting them.
Jay Schulman's picture
The ability to recruit the right person for an application security role who can also find the flaws is a struggle for many organizations. These job openings rarely get filled.
Marc Solomon's picture
The global cybersecurity skills shortage isn’t going away any time soon. But by attacking it on multiple fronts we can proactively work to address it
Jason Polancich's picture
Starting your own private ISAC is easier and more important long-term than you might think.
Marc Solomon's picture
While we can’t address security without technology, we also need to consider education. Organizations must also be committed to keeping their IT security staff highly trained on the current threat landscape and advanced approaches to security.