informa
/

Careers & People

The Power of Comedy for Cybersecurity Awareness Training
Cybersecurity is serious stuff, but the way we talk about it shouldn't be if we want people to pay attention and remembe...
July 30, 2021
Cybersecurity is serious stuff, but the way we talk about it shouldn't be if we want people to pay attention and remembe...
by Jann Yogman, Entertainment industry veteran and writer of Mimecast Awareness Training
July 30, 2021
4 min read
Article
Corporate Mismanagement Contributing to Cybersecurity Hiring Challenges
Lack of competitive compensation and unrealistic requirements are impeding the ability to acquire qualified cybersecurit...
July 29, 2021
Lack of competitive compensation and unrealistic requirements are impeding the ability to acquire qualified cybersecurit...
by Jai Vijayan, Contributing Writer
July 29, 2021
5 min read
Article
Why Your People Are the Best Untapped Security Strategy
To elevate your security strategy, hire skilled security talent while establishing a security-centric culture among empl...
July 29, 2021
To elevate your security strategy, hire skilled security talent while establishing a security-centric culture among empl...
by Jason Lee, Chief Information Security Officer, Zoom
July 29, 2021
4 min read
Article
Name That Toon: Buzzard Bestie
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
July 20, 2021
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
by John Klossner, Cartoonist
July 20, 2021
1 min read
Article
How to Attract More Computer Science Grads to the Cybersecurity Field
With 465,000 cybersecurity job openings in the United States, why is recruiting so difficult? A recent college graduate ...
July 16, 2021
With 465,000 cybersecurity job openings in the United States, why is recruiting so difficult? A recent college graduate ...
by Biagio DeSimone, Enterprise Solution Architect, Aqua Security
July 16, 2021
5 min read
Article
What to Look for in an Effective Threat Hunter
The most important personality traits, skills, and certifications to look for when hiring a threat hunting team.
July 15, 2021
The most important personality traits, skills, and certifications to look for when hiring a threat hunting team.
by Troy Gill, Manager of Security Research and Zix’s AppRiver Threat Research Team
July 15, 2021
4 min read
Article
Did the Cybersecurity Workforce Gap Distract Us From the Leak?
Cyber games can play a critical role in re-engaging our workforce and addressing the employee retention crisis.
July 14, 2021
Cyber games can play a critical role in re-engaging our workforce and addressing the employee retention crisis.
by Jessica Gulick, US Cyber Games Commissioner
July 14, 2021
4 min read
Article
5 Mistakes That Impact a Security Team's Success
The way we work and treat each other go a long way in improving our organizations' security posture.
July 02, 2021
The way we work and treat each other go a long way in improving our organizations' security posture.
by Joshua Goldfarb, Director of Product Management at F5
July 02, 2021
4 min read
Article
WFH: A Smart Time to Revisit Employee Use of Social Media
Employers have their hands full when it comes to monitoring online activities that could hurt the brand or violate the o...
July 02, 2021
Employers have their hands full when it comes to monitoring online activities that could hurt the brand or violate the o...
by Jennifer DeTrani & Landon Winkelvoss, General Counsel/EVP, Nisos / VP of Content and Co-Founder, Nisos
July 02, 2021
5 min read
Article
8 Ways to Preserve Legal Privilege After a Cybersecurity Incident
Knowing your legal distinctions can make defense easier should you end up in court after a breach, attack, or data loss.
July 02, 2021
Knowing your legal distinctions can make defense easier should you end up in court after a breach, attack, or data loss.
by Caroline Morgan & Melissa Parisi, Partner, Culhane Meadows, PLLC / Senior Director of Worldwide Privacy, Herbalife Nutrition
July 02, 2021
5 min read
Article
WhiteHat Security Rebrands as NTT Application Security
The name change follows NTT Security Corporation's acquisition of WhiteHat in 2019.
July 01, 2021
The name change follows NTT Security Corporation's acquisition of WhiteHat in 2019.
by Dark Reading Staff, Dark Reading
July 01, 2021
1 min read
Article
The Danger of Action Bias: Is It Always Better to Act Quickly?
Experts discuss the meaning of action bias and how it presents a threat to IT security leaders, practitioners, and users...
June 28, 2021
Experts discuss the meaning of action bias and how it presents a threat to IT security leaders, practitioners, and users...
by Kelly Sheridan, Senior Editor
June 28, 2021
6 min read
Article
The Role of Encryption in Protecting LGBTQ+ Community Members
The Internet is a vital tool that helps LGBTQ+ community members communicate without fear of persecution — and strong en...
June 28, 2021
The Internet is a vital tool that helps LGBTQ+ community members communicate without fear of persecution — and strong en...
by Anna Higgins, Policy Advisor, Internet Society
June 28, 2021
5 min read
Article
School's Out for Summer, but Don't Close the Book on Cybersecurity Training
Strengthening their security posture should be at the top of school IT departments' summer to-do list.
June 25, 2021
Strengthening their security posture should be at the top of school IT departments' summer to-do list.
by Drew Daniels, CIO & CISO, Druva
June 25, 2021
5 min read
Article
Boardroom Perspectives on Cybersecurity: What It Means for You
Because board members are paying close attention to security, security leaders must be able to respond to and alleviate ...
June 24, 2021
Because board members are paying close attention to security, security leaders must be able to respond to and alleviate ...
by Brian Contos, VP & CISO, Mandiant Advantage
June 24, 2021
5 min read
Article