Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/17/2016
04:50 PM
Connect Directly
Google+
Twitter
RSS
E-Mail vvv
50%
50%

Clearing A Path To The Cybersecurity Field

Tune in to Dark Reading Radio on Wednesday, Oct. 19 at 1pmET, when we'll discuss what specific efforts in industry, academia, and government, are under way to fill the cybersecurity skills gap.

If there was ever a tipping point in information security's well-known and maligned skills gap, it would be right about now.

There are some 200,000 unfilled cybersecurity jobs in the US and around 1 million worldwide. Demand for people to fill those jobs will increase 53% by 2018, and there aren't enough people with the skills to fill the current positions, much less the future ones.

At the same time, Russia is flexing its cyberattack prowess against US political interests with the alleged hacking of voter registration databases as well as of the Democratic National Committee (DNC), and then dumping allegedly stolen data online via WikiLeaks. Cybercrime continues to rise, and mega data breaches affecting millions of people continue to occur, such as Yahoo and the Office of Personnel Management.

Yet there still isn't a clear path to a career in security. So what now?

There's actually hope on the horizon. A wave of programs aimed at boosting training, education, and exposure to cybersecurity have cropped up. But it's not clear just how quickly these newly launched programs will be able to pump out new cybersecurity-ready job candidates.

Join me for the next episode of Dark Reading Radio on Wednesday, October 19 at 1pmET/4pmPT, "The Cyber Skills Shortage," when I'll host guests Carson Sweet, co-founder and CTO of CloudPassage, which published an eye-popping study of the security gap in top US undergraduate computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education (NICE). NICE is a government, academia, and industry effort that provides grant money to security education, training, and workforce development.

We'll look at what's actually being done to get job candidates the proper education and training they need to join the security industry. After our panel discussion, we will hold a 30-minute live online chat where you can submit your own questions to Sweet and Peterson. (If you're not registered for the site, you can do so here).

Related Content:

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19807
PUBLISHED: 2019-12-15
In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for ...
CVE-2014-8650
PUBLISHED: 2019-12-15
python-requests-Kerberos through 0.5 does not handle mutual authentication
CVE-2014-3536
PUBLISHED: 2019-12-15
CFME (CloudForms Management Engine) 5: RHN account information is logged to top_output.log during registration
CVE-2014-3643
PUBLISHED: 2019-12-15
jersey: XXE via parameter entities not disabled by the jersey SAX parser
CVE-2014-3652
PUBLISHED: 2019-12-15
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.