Bridging the widening cybersecurity skills gap

Bridging the widening cybersecurity skills gap

In today’s cyber landscape, the challenges loom large. Evolving threats and technologies have reshaped the battleground, making traditional on-premises infrastructure defenses obsolete. Despite advancements in security tools, a pressing issue remains: a significant shortage of skilled professionals. In addition to the compromise of mission-critical systems and networks, enterprises grapple with reputational damage, financial losses, compliance hurdles and legal ramifications from a cyberattack. Organizations must not only address current risks but also anticipate future threats, safeguard…

Read More

One of the biggest threats to a cybersecurity team? Employee burnout

One of the biggest threats to a cybersecurity team? Employee burnout

One of the biggest threats to a cybersecurity team? Employee burnout | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Chris Fallon named CIO at Fortune Brands GPG

Chris Fallon named CIO at Fortune Brands GPG

Chris Fallon named CIO at Fortune Brands GPG | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Ralph Buelling named CIO at UW Credit Union

Ralph Buelling named CIO at UW Credit Union

Ralph Buelling named CIO at UW Credit Union | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Listen to Teresa Shea, VP of Cyber at Raytheon Intelligence & Space talk enterprise threats

Listen to Teresa Shea, VP of Cyber at Raytheon Intelligence & Space talk enterprise threats

Listen to Teresa Shea, VP of Cyber at Raytheon Intelligence & Space talk enterprise threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

The Cybersecurity and Geopolitical podcast – Cyber warfare, cyber mischief and the cost to nation-states, Episode 5

The Cybersecurity and Geopolitical podcast – Cyber warfare, cyber mischief and the cost to nation-states, Episode 5

The Cybersecurity and Geopolitical podcast – Cyber warfare, cyber mischief and the cost to nation-states, Episode 5 | 2021-08-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our…

Read More

DHS partners with Girl Scouts to launch cyber awareness challenge

DHS partners with Girl Scouts to launch cyber awareness challenge

DHS partners with Girl Scouts to launch cyber awareness challenge | 2021-08-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Cybersecurity professionals to newcomers: Focus on vendor-neutral certifications

Cybersecurity professionals to newcomers: Focus on vendor-neutral certifications

Cybersecurity professionals to newcomers: Focus on vendor-neutral certifications | 2021-07-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Using risk quantification to assess cyber risk

Using risk quantification to assess cyber risk

Using risk quantification to assess cyber risk | 2021-06-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

April’s Cybersecurity & Geopolitical podcast is up!

April’s Cybersecurity & Geopolitical podcast is up!

April’s Cybersecurity & Geopolitical podcast is up! | 2021-04-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More