informa

Careers & People

Registration for the (ISC)² Entry-Level Cybersecurity Certification Exam Pilot Program Is Now Open
New certification validates students' and career changers' foundational skills and helps kickstart their cybersecurity careers.
January 24, 2022
New certification validates students' and career changers' foundational skills and helps kickstart their cybersecurity careers.
January 24, 2022
4 min read
Article
4 Ways to Develop Your Team's Cyber Skills
Organizations need to invest in professional development — and then actually make time for it.
January 20, 2022
Organizations need to invest in professional development — and then actually make time for it.
by Jeff Orloff, Vice President of Products and Technical Services, RangeForce
January 20, 2022
4 min read
Article
Cloud Adoption Widens the Cybersecurity Skills Gap
No matter what cloud services you employ, you are still responsible for protecting the security of your data.
January 19, 2022
No matter what cloud services you employ, you are still responsible for protecting the security of your data.
by A.N. Ananth, President, Netsurion
January 19, 2022
4 min read
Article
(ISC)² Launches Entry-Level Cybersecurity Course
Prospective entrants to the sector will receive instruction on fundamental cybersecurity concepts on which they will be evaluated during the new (ISC)² entry-level cybersecurity certification pilot exam.
January 19, 2022
Prospective entrants to the sector will receive instruction on fundamental cybersecurity concepts on which they will be evaluated during the new (ISC)² entry-level cybersecurity certification pilot exam.
January 19, 2022
3 min read
Article
Name That Toon: Nowhere to Hide
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 18, 2022
1 min read
Article
Redefining the CISO-CIO Relationship
While these roles have different needs, drivers, and objectives, they should complement each other rather than compete with one another.
January 13, 2022
While these roles have different needs, drivers, and objectives, they should complement each other rather than compete with one another.
by Alex Cunningham, Senior Vice President and Chief Information Security Officer, Advisor360°
January 13, 2022
4 min read
Article
Critical Infrastructure Security and a Case for Optimism in 2022
The new US infrastructure law will fund new action to improve cybersecurity across rail, public transportation, the electric grid, and manufacturing.
January 12, 2022
The new US infrastructure law will fund new action to improve cybersecurity across rail, public transportation, the electric grid, and manufacturing.
by Kurt John, Chief Cybersecurity Officer, Siemens USA
January 12, 2022
5 min read
Article
Let's Play! Raising the Stakes for Threat Modeling With Card Games
On a recent Friday night, three security experts got together to play custom games that explore attack risks in an engaging way.
January 11, 2022
On a recent Friday night, three security experts got together to play custom games that explore attack risks in an engaging way.
by Andrada Fiscutean, Contributing Writer
January 11, 2022
7 min read
Article
Why Security Awareness Training Should Begin in the C-Suite
It's not just the rights and privileges that CXOs have on the network. They can also set an example of what good security hygiene looks like.
January 11, 2022
It's not just the rights and privileges that CXOs have on the network. They can also set an example of what good security hygiene looks like.
by Ashley Rose, CEO and Co-Founder, Living Security
January 11, 2022
4 min read
Article
Rethinking Cybersecurity Jobs as a Vocation Instead of a Profession
The prevailing mindset is that security practitioners are professionals, and thus, require a college degree. But there are some flaws in that logic.
January 06, 2022
The prevailing mindset is that security practitioners are professionals, and thus, require a college degree. But there are some flaws in that logic.
by Sounil Yu, CISO and Head of Research, JupiterOne
January 06, 2022
4 min read
Article
Vinnie Liu Has a Mission: Keeping People Safe Online and Offline
Security Pro File: The years at the National Security Agency shaped Vinnie Liu's views on security. "We're missionaries, not mercenaries," he says.
January 04, 2022
Security Pro File: The years at the National Security Agency shaped Vinnie Liu's views on security. "We're missionaries, not mercenaries," he says.
by Carlo Massimo, Freelance Writer
January 04, 2022
7 min read
Article
Why CIOs Should Report to CISOs
If the CISO is responsible for the security of the organization, then that same person also should be responsible for both security and IT infrastructure.
January 04, 2022
If the CISO is responsible for the security of the organization, then that same person also should be responsible for both security and IT infrastructure.
by J.J. Guy, CEO and Co-Founder, Sevco Security
January 04, 2022
5 min read
Article
Creating the Next Generation of Secure Developers
Helping management prioritize developer education is a tall order, but it's one the industry must figure out.
January 03, 2022
Helping management prioritize developer education is a tall order, but it's one the industry must figure out.
by Chris Wysopal, Chief Technology Officer, Veracode
January 03, 2022
5 min read
Article
The CISO as Sustaining Force: Helping Infosec Staff Beat Burnout
To protect their staffers, leaders should focus on identifying and alleviating root causes of burnout.
December 27, 2021
To protect their staffers, leaders should focus on identifying and alleviating root causes of burnout.
by Mark Tarallo, Journalist and Author
December 27, 2021
6 min read
Article
Trend Micro Crowns Champions of 2021 Capture the Flag Competition
Challenges were designed to address critical areas of cybersecurity, including reversing, cloud, IoT, open source intelligence, forensics, and machine learning.
December 20, 2021
Challenges were designed to address critical areas of cybersecurity, including reversing, cloud, IoT, open source intelligence, forensics, and machine learning.
December 20, 2021
3 min read
Article