Security Experts:

long dotted


There’s a severe shortage of cybersecurity professionals and not enough financial firepower to compete with federal counterparts, global brands and specialized cybersecurity firms. [Read More]
The three-year course will help train future prosecutors and attorneys on handling cybersecurity-related cases. [Read More]
Amazon says it will offer free multi-factor authentication devices for AWS customers and cybersecurity training materials. [Read More]
Some of the country’s leading technology companies have committed to investing billions of dollars to strengthen cybersecurity defenses and to train skilled workers, [Read More]
SecurityWeek talks to ISSA International President Candy Alexander about the cybersecurity skills shortage and the organizations' annual survey. [Read More]
The new funding round brings the total raised by the Breach and Attack Simulation (BAS) systems vendor to $79 million. [Read More]
As part of the initiative, the Department of Homeland Security is announcing an additional 500 tentative job offers. [Read More]
The Ransomware Readiness Assessment (RRA) module will help organizations assess whether they can defend and recover from a ransomware attack. [Read More]
Immersive plans to use the new funds to accelerate the delivery of a progressive new Cyber Workforce Optimization platform. [Read More]
Three European Union member nations and three Middle Eastern countries are looking to train personnel in border, customs, maritime and cybersecurity techniques at a cutting-edge U.S.-funded facility in Cyprus that is expected to be ready early next year. [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Jeff Orloff's picture
To sharpen and learn cybersecurity skills, security professionals need to ‘play’ in a safe, yet stimulating place that provides hands-on, interactive upskilling.
Marie Hattar's picture
In order to deliver on the promise of 5G, we need new industry standards for security, testing, and training to proactively combat 5G cyber threats and minimize risks.
Gordon Lawson's picture
For red teams, using an obfuscated network for testing offers the advantage of hiding who is performing the attack and where it is originating, for a more real-life context
Jeff Orloff's picture
Most organizations rely too heavily on their cybersecurity pros to protect them from threats, ignoring the painful reality that human error is by far the most common cause of security breaches.
Jeff Orloff's picture
It’s important to show the effectiveness of training initiatives. Managers want to make sure that they're getting a return on their investment and justify future training budgets requests.
Derek Manky's picture
As we see an increasing number of recent attacks against critical infrastructure – cybersecurity and physical security can be intrinsically linked.
Jeff Orloff's picture
Offering SOC staff professional development opportunities turns out to be a tool for talent retention.
Rob Fry's picture
By taking some lessons from outside our cybersecurity sandbox, we can address some of the significant challenges in cybersecurity.
Gordon Lawson's picture
Everyone is familiar with the three legs of cybersecurity stool: people, processes and technology. But most companies typically invest in just one area – technology.
Derek Manky's picture
With the pandemic creating a massive remote work shift and consequent rises in cyber risk, finding individuals with cybersecurity skills is harder than ever.