Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Understanding why Israel produces so many cybersecurity firms starts with understanding the converyor belt of talent that 8200 produces. [Read More]
Thirty-five percent of CISOs in the financial sector consider staff training to be the top priority for cyber defense. Twenty-five percent prioritize infrastructure upgrades and network defense. [Read More]
Insurance companies and non-profit organizations are most likely to fall for phishing attacks, according to a study of 6 million users conducted by KnowBe4 [Read More]
Study conducted by Accenture and AMA shows that a majority of physicians in the US have experienced a cybersecurity incident, including phishing, malware and inappropriate access by insiders [Read More]
DigiCert addresses the concerns raised by Mozilla and others regarding its acquisition of Symantec’s certificate business [Read More]
Webroot buys security awareness training company Securecast to offer a security awareness platform to MSPs [Read More]
The National Institute of Standards and Technology (NIST) has published a cybersecurity workforce framework to support organizations' ability to develop and maintain an effective cybersecurity workforce. [Read More]
Change 2 to the National Industrial Security Program Operating Manual (NISPOM 2) specifies that all cleared personnel receive prior insider threat awareness training prior to gaining access to classified information. [Read More]
CompTIA has announced CSA+, a new security qualification which focuses on the skills required for the use of threat detection tools, data analysis and the interpretation of results to identify vulnerabilities, threats and risks. [Read More]
Report looks how to address the growing skills gap as demand for qualified cyber security professionals continues to outstrip supply. [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Torsten George's picture
Cyber attackers long ago figured out that the easiest way for them to gain access to sensitive data is by compromising an end user’s identity and credentials.
Ashley Arbuckle's picture
We’ve seen an evolution from more traditional simulation exercises that use a Red Team to identify vulnerabilities and launch mock attacks and a Blue Team to detect and respond to attacks, to Purple Teaming exercises.
Michael Moniz's picture
To be an outstanding cybersecurity professional, you need to think outside of the box, be intellectually curious, self-sufficient and collaborative.
Joshua Goldfarb's picture
Writing and documenting aren’t the most exciting activities. But they have tremendous potential, both in improving security operations and incident response, as well as in opening up a constructive dialogue.
Travis Greene's picture
Attended by roughly 40,000 people, RSA Conference 2016 was the biggest ever. Here are some observations on security trends observed at the event that took place last week at the conference.
Alastair Paterson's picture
Cyber Threat Intelligence (CTI) is critical for organizations that want to gain a comprehensive, tailored and relevant view of the potential threats and types of attackers that could be targeting them.
Jay Schulman's picture
The ability to recruit the right person for an application security role who can also find the flaws is a struggle for many organizations. These job openings rarely get filled.
Marc Solomon's picture
The global cybersecurity skills shortage isn’t going away any time soon. But by attacking it on multiple fronts we can proactively work to address it
Jason Polancich's picture
Starting your own private ISAC is easier and more important long-term than you might think.
Marc Solomon's picture
While we can’t address security without technology, we also need to consider education. Organizations must also be committed to keeping their IT security staff highly trained on the current threat landscape and advanced approaches to security.