Justifying the Value of Conference Attendance to Your Boss

Read why Jim Nitterauer says that attending Infosec conferences is necessary for IT pros and C-Suite employees on Tripwire : Over the weekend, I became immersed in a discussion on Twitter centered around getting more people involved in InfoSec conferences. Lesley’s initial point led to many great responses relating to the value of attending conferences and the […]

Do Security Pros Need a Single Unifying Platform?

A new study finds that cyber-security professionals want to protect their data with a single unifying platform, rather using piecemeal tools. Despite making heavy investments in security tools, organizations suffer technical challenges in protecting their data. Read/see the slideshow explaining why the security pros need a single unifying platform on CIO Insight.

Revolutionising the cyber-security skills gap with ‘ethical hacking’

Read why Riaan Van Boom says that it is necessary to prepare for cyber attacks by training staff in ethical hacking on Business Live : Cyber security attacks are inevitable — the threats rising steadily along with increasingly professional cyber-criminal networks and attack vectors. Unfortunately, the security skills needed by organisations to prepare for these […]

4 Signs You, Your Users, Tech Peers & C-Suite All Have ‘Security Fatigue’

Read Tom Pendergast list four signs that your company employees are suffering from cyber security fatigue on Dark Reading : There’s been a lot of talk about security fatigue lately, in the press and in my office. It’s a term that people get right away, and it feels like one of the classic social phenomena […]

What Executives and Board Members Should Demand of Security

Read Alex Moyes explain what company boards should demand of cyber security on Infosec Magazine : If there is an active intruder in your network, you would likely not know. Like most organizations, you would be in the dark. It is entirely possible that months or even years ago, an outsider gained access to the network […]

IT Leaders and Execs Pass the Buck on Cyber Response

IT decision makers and C-level executives both believe it is the other’s job to manage the response to a cybersecurity incident, according to new research from BAE Systems. The British defense contractor polled 221 Fortune 500 C-level execs and 984 IT leaders in eight countries around the world including the UK, US, Germany, Australia, Singapore and […]

Attention to cyber-security is becoming daily routine in the C-suite

While far-reaching and diverse, the underlying causes of security risks are amenable to collective action. According to new global research from The Economist Intelligence Unit (EIU), business leaders agree that they should, and can, think beyond the traditional horizons of their security efforts. Read about the new research by The Economist Intelligence Unit (EIU) which […]

Rise of the ‘accidental’ cybersecurity professional

Read Alison DeNisco take a look at the accidental cyber security professional born out of acute skill shortage on Tech Republic : With an extreme shortage of trained cybersecurity professionals, it’s becoming increasingly common for people—especially women—to enter the field from other careers, including IT, law, compliance, and government. These employees form a group of […]

The Gap of Cyber Security, Digital Forensic and Infosec Professionals

Read Ricoh Danielson take a look at the skill gap between cyber security, digital forensic and infosec professional on Tripwire : The industry can see this and knows this. However, it sometimes does not adhere to the needs of weathering through “hardship experiences” that are needed to move up in the information security industry. One thing I […]

How information security professionals can help business understand cyber risk

Read Warwick Ashford’s article about how information security professionals can help business understand the cyber risks on Computer Weekly : The UK government’s latest National Cyber Security Strategy requires businesses to have a detailed understanding of the risks to their information systems and raise standards to mitigate them. The challenge comes as businesses are becoming increasingly reliant […]