Recruiting and retaining cybersecurity talent

Research shows cybersecurity professionals value competitive compensation, a strong cybersecurity culture and business management commitment to cybersecurity.


Cybersecurity Canon book review: There Will Be Cyberwar

Richard Stiennon’s book There Will Be Cyberwar is a good read for those interested in the intersection of network-centric warfare and security vulnerabilities.


IT attrition could help address the cybersecurity skills shortage

Infrastructure specialists with strong IT skills should be welcomed into the cybersecurity professional community.


The truth about cybersecurity certifications

Beyond the Certified Information Systems Security Professional (CISSP), other certifications are more specialized, esoteric and of marginal value.


The state of cybersecurity professional careers

A new report points to severe skills deficiencies, a lack of career planning, and inadequate training, representing existential cybersecurity risk.


Splunk intent on extending cybersecurity leadership

The Splunk user conference (.Conf2016) highlights a balance between powerful new features and ease-of-use benefits.


Keeping up with incident response

Enterprise organizations are forced to ignore security alerts, live with excess risk, and deal with data breaches reactively when they happen.


SIEM market dynamics in play

Financial churn combined with new requirements are transforming the SIEM market for enterprise organizations.


The era of identity-based applications

Enterprise organizations must elevate identity management beyond IT operations and make it an essential component of business processes and security.


Cybersecurity Goes Private: McAfee and RSA

Good opportunities but challenges ahead for both companies


VMworld: My Cybersecurity-Centric Impressions

NSX security is gaining traction in the VMware installed based but the story remains confusing to cybersecurity professionals. VMware needs to bolster its NSX security go-to-market initiatives to scale to the next level


Cybersecurity and VMworld

What is VMware’s role in security and how is it impacting cybersecurity professionals and the industry? This week’s VMworld will tell the tale.


The need for network security operations automation

Cloud computing, network scale and incident response demand a better model for network security operations.


More on operationalizing threat intelligence

Four steps to turn threat intelligence data into measurable actions and results


CISOs adopt a portfolio management approach for cybersecurity

With a long to-do list and perpetual skills shortage, CISOs are managing cybersecurity requirements, allocating resources and outsourcing.


A few thoughts from Black Hat 2016

Threats, vulnerabilities and security complexity represent serious challenges for cybersecurity professionals.


Anticipating Black Hat

The Black Hat conference heads to Vegas next week, with a big interest in anti-ransomware, endpoint security, security analytics, cloud and IoT security.


Russian DNC hack – A cybersecurity microcosm

The Russian hack of the DNC a microcosm of cybersecurity at large. Many companies are as vulnerable as the organization and as underprepared to handle such attacks.


Cybersecurity: A vertical industry application?

New threats, risk management and IoT may make transform cybersecurity from being a set of horizontal technologies into a vertical business application.


Crypto: Nominated to the Cybersecurity Canon

Crypto, Steven Levy’s classic about privacy technology pioneers, is recommended reading for all cybersecurity professionals and should be inducted into the Cybersecurity Canon.


Load More