News
4/26/2017
10:19 AM
Dawn Kawamoto
Dawn Kawamoto
Slideshows
50%
50%

6 Steps to Find Your Next Dozen Cloud Security Experts

There's stiff competition for cloud security experts, but finding yours may actually be easier than you think.
Previous
1 of 7
Next

Image Source: Robert Half 2016

Image Source: Robert Half 2016

With roughly 1 million-plus IT security jobs out there in the market, approximately 5% of them are cloud security positions, estimates Eddie Borrero, chief information security officer and enterprise information security and head of global customer support for recruiting firm Robert Half International.

And hiring for these cloud security positions is tough, especially when you consider the steep shortage of cybersecurity workers overall, Borrero notes. For example, cybersecurity training organization ISC2 forecasts a global shortfall of 1.8 million cybersecurity professionals by 2022.

"Traditional security needs to do an uptick in skills, as companies move their data and technologies to the cloud," he says.

In a 2016 Robert Half survey of UK CIOs, 51% of respondents listed cloud security as the No. 1 technical security skill that is in the most demand, yet 32% of survey respondents noted it was the most challenging to fill.

But as CISOs and hiring managers feel the pressure to find what they believe to be a need for a team of cloud security experts, Borrero offers a different perspective to address the problem and potentially create an easier workaround. Here are six actions he recommends.

 

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JeffM108
100%
0%
JeffM108,
User Rank: Apprentice
4/27/2017 | 10:07:44 AM
Editorial complaint
Does everything here really need to require six or more clicks to read? I've come to several posts here lately that require me to click to the next page, only to find two or three short paragraphs on each one. At some point, the benefit from the extra ad impressions you get are going to fall off. I'm already becoming reluctant to bite at a good headline from your site because I know I'll be needlessly clicking through to read the whole article. Some content lends itself to a multi-page format. But the deciding factor should be readability for users, not...whatever you're doing here.
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Tell the sysadmin that we have a situation.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.