Careers and certifications
Security admins, pen testers and CISOs are a few of many potential cybersecurity careers. Get advice on making a career choice and finding the trainings and certifications -- such as Security+, CISSP and CCSK -- needed to land an infosec job, along with guidance on succeeding in a security profession.
Top Stories
-
Tip
19 Nov 2024
What skills are needed for a successful career in IAM?
In the zero-trust era, identity management is critical to an organization's cybersecurity posture. What skills are required to transition into a career in IAM? Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Video
13 Nov 2024
An explanation of ethical hackers
Ethical hackers protect businesses by identifying vulnerabilities. They use the same techniques as malicious hackers, but for the greater good. Continue Reading
By- Kaitlin Herbert, Content writer
-
Video
13 Nov 2024
An explanation of ethical hackers
Ethical hackers protect businesses by identifying vulnerabilities. They use the same techniques as malicious hackers, but for the greater good. Continue Reading
By- Kaitlin Herbert, Content writer
-
Feature
07 Nov 2024
15 IAM interview questions to prep for your next career move
The job market for identity and access management positions is strong right now, but the competition could be tough. Use these 15 questions to guide your interview prep. Continue Reading
-
Tip
30 Oct 2024
Top AI security certifications to consider
AI security certifications, much like AI itself, are evolving. Does it make sense to go through the time and money to obtain a credential, given how quickly the field is changing? Continue Reading
By- Jerald Murphy, Nemertes Research
- Sharon Shea, Executive Editor
-
Feature
30 Oct 2024
Diversity in leadership: Forge your own success
Eugina Jordan is a CMO in tech who wrote a leadership book for underrepresented professionals who want to become corporate leaders. Here, she answers four questions about the book. Continue Reading
By- Natasha Carter, Director of Partnerships and Event Content
-
Feature
24 Oct 2024
Equipment to include in a computer forensic toolkit
Computer forensic investigators require more than software to do their job. Learn what equipment constitutes a complete computer forensic toolkit. Continue Reading
By- Kyle Johnson, Technology Editor
- Packt Publishing
-
News
17 Oct 2024
Joe Sullivan: CEOs must be held accountable for security too
The former CSO at Uber was found guilty in 2022 of obstruction of justice relating to a breach. Now he's calling for clearer regulatory frameworks for security. Continue Reading
By- Nicole Laskowski, Senior News Director
-
Definition
11 Oct 2024
What are CPE (continuing professional education) credits?
Continuing professional education, or CPE, credit is a term referring to the points professionals receive for participating in specialized training in IT and other fields. Continue Reading
-
Tip
19 Sep 2024
6 cybersecurity soft skills to elevate your career
Cybersecurity professionals have the technical skills to protect their corporate networks, but they also need to master certain soft skills if they truly want to be effective. Continue Reading
By -
Tip
30 Aug 2024
4 AI cybersecurity jobs to consider now and in the future
Now hiring: At the intersection of AI and cybersecurity, career opportunities are emerging. Explore four new jobs that combine AI and security expertise. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Feature
06 Aug 2024
9 AI-proof IT jobs, plus how to be irreplaceable
As automation and artificial intelligence tools do more work in more organizations, some technologists are worried AI will take their job. Learn which jobs are safest and why. Continue Reading
By -
Feature
23 Jul 2024
The ultimate guide to cybersecurity planning for businesses
This in-depth cybersecurity planning guide provides information and advice to help organizations develop a successful strategy to protect their IT systems from attacks. Continue Reading
By- Craig Stedman, Industry Editor
-
Tip
16 Jul 2024
What a cybersecurity analyst does and how to become one
Security analysts play a critical role in defending organizations' sensitive information from cyberattacks. Learn more about the position and how to pursue it. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
01 Jul 2024
Top 10 cybersecurity interview questions and answers
Interviewing for a job in cybersecurity? Memorizing security terms won't cut it. Here are the 10 interview questions you should be ready for -- and how to answer them. Continue Reading
By- Steve Zurier, ZFeatures
-
Feature
27 Jun 2024
Will AI replace cybersecurity jobs?
Although AI can enhance cybersecurity practices like threat detection and vulnerability management, the technology's limitations ensure a continued need for human security pros. Continue Reading
By -
Feature
26 Jun 2024
How to become a cybersecurity architect
From help desk support personnel to network admin, learn about the multiple paths that can lead to becoming an effective and knowledgeable cybersecurity architect. Continue Reading
By- Kyle Johnson, Technology Editor
- Packt Publishing
-
Tip
26 Jun 2024
5 essential programming languages for cybersecurity pros
Coding is an important skill across almost every technology discipline today, and cybersecurity is no exception. Learn about the top programming languages for security professionals. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Tip
12 Jun 2024
The 10 best cloud security certifications for IT pros in 2024
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
21 May 2024
CISSP or CISM: Which should you pursue?
For hopeful practitioners, the question of whether to pursue CISSP or CISM depends on their career goals and interests. For some, the question should be, 'Why not both?' Continue Reading
By -
Tip
07 May 2024
What is a cloud security engineer, and how do I become one?
A cloud security engineer has specific responsibilities for helping to secure cloud infrastructure, applications and IT assets. Continue Reading
-
Feature
15 Mar 2024
7 cybersecurity conferences to attend in 2024
Cybercriminals create new ways to steal information regularly, creating cybersecurity challenges. Attending conferences is one way to learn about these trends for the best defense. Continue Reading
By- Sarah Amsler, Senior Managing Editor
- Amanda Hetler, Senior Editor
-
Definition
15 Mar 2024
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program. Continue Reading
By- Sharon Shea, Executive Editor
-
Definition
22 Feb 2024
cybersecurity
Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats. Continue Reading
By- Sharon Shea, Executive Editor
- Alexander S. Gillis, Technical Writer and Editor
-
Tip
31 Jan 2024
Cybersecurity career path: 5-step guide to success
Taking the lead from ISSA's framework, here's a guide to how you can map out a long and profitable career in cybersecurity. Continue Reading
By- Steve Zurier, ZFeatures
-
Tip
31 Jan 2024
10 must-have cybersecurity skills for career success in 2024
Looking to advance your cybersecurity career? Here are the skills you need to win a CISO job, land a threat hunter gig and snag other security positions in high demand. Continue Reading
By- Steve Zurier, ZFeatures
-
Tip
29 Jan 2024
Top 4 incident response certifications to consider in 2024
Cybersecurity professionals pursuing an incident response track should consider the following certifications to bolster their knowledge and advance their career. Continue Reading
By -
Tip
29 Jan 2024
Cybersecurity skills gap: Why it exists and how to address it
The cybersecurity skills shortage is putting enterprises at risk. Worse, it shows no sign of abating. Here is why it's happening and what employers can do to mitigate the problem. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Tip
10 Jan 2024
10 cybersecurity certifications to boost your career in 2024
A consensus of industry professionals rank these 10 security certifications as the most coveted by employers and security pros -- plus links to 10 vendor security certifications. Continue Reading
By- Steve Zurier, ZFeatures
-
Feature
08 Jan 2024
How to become an incident responder: Requirements and more
Incident response is a growth area that provides career advancement options and a good salary. Here's an in-depth look at job requirements, salaries and available certifications. Continue Reading
By- Ed Moyle, Drake Software
-
Feature
05 Jan 2024
Top 8 in-demand cybersecurity jobs for 2024 and beyond
Cybersecurity is a challenging career path, filled with professional opportunities. Learn about the top cybersecurity jobs and the training and background they require. Continue Reading
By -
Tip
04 Jan 2024
Top 12 online cybersecurity courses for 2024
Our panel of experts picked the best free and paid online cybersecurity courses for professionals looking to advance their careers and for newbies breaking into the field. Continue Reading
By- Steve Zurier, ZFeatures
-
Definition
19 Dec 2023
CISO (chief information security officer)
The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Definition
14 Dec 2023
massive open online course (MOOC)
A massive open online course (MOOC) is a typically free web-based distance learning program that's designed for large numbers of geographically dispersed students. Continue Reading
By- Kinza Yasar, Technical Writer
- Wesley Chai
- Ivy Wigmore
-
Opinion
31 Oct 2023
How to overcome the beginner cybersecurity career Catch-22
The workforce gap constantly makes headlines, but that doesn't mean breaking into the field is easy. Get advice on how to start on an entry-level cybersecurity career path. Continue Reading
By- Jon Oltsik, Analyst Emeritus
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Feature
30 Oct 2023
What does an IT security manager do?
IT security managers need to have a passion for learning and critical thinking skills, as well as understand intrusion prevention and detection. Continue Reading
-
Definition
06 Oct 2023
CSSLP (Certified Secure Software Lifecycle Professional)
CSSLP (Certified Secure Software Lifecycle Professional) is a certification from ISC2 that focuses on application security within the software development lifecycle (SDLC). Continue Reading
By- Madelyn Bacon, TechTarget
-
Tip
29 Sep 2023
How to land a corporate board seat as a CISO
Any CISO who aspires to a corporate board seat needs a strategic approach. Learn how security executives can position themselves to become top-level decision-makers. Continue Reading
By- Jerald Murphy, Nemertes Research
-
Feature
18 Jul 2023
IT hiring picks up amid ongoing economic concerns
TechTarget's 2023 salary and careers survey shows most organizations are hiring for selected IT skills, making progress on DEI initiatives and offering workplace flexibility. Continue Reading
By- John Moore, Industry Editor
-
Definition
01 Jun 2023
NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework)
The NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework) is a reference resource that classifies the typical skill requirements and duties of cybersecurity workers. Continue Reading
-
Feature
23 May 2023
How to become a bug bounty hunter: Getting started
Finding, exploiting and reporting vulnerabilities can be both lucrative and educational. Security researcher Vickie Li explains how to become a bug bounty hunter. Continue Reading
By- Alissa Irei, Senior Site Editor
-
News
10 May 2023
CISOs face mounting pressures, expectations post-pandemic
Proofpoint's 2023 Voice of the CISO report shows deep concern among executives about impending data loss and exposure from negligent -- and malicious -- employees. Continue Reading
By- Alexis Zacharakos, Student Co-op
-
Definition
09 May 2023
Certified Cloud Security Professional (CCSP)
Certified Cloud Security Professional (CCSP) is an International Information System Security Certification Consortium, or (ISC)2, certification that covers cloud-based cybersecurity best practices. Continue Reading
By- Casey Clark, TechTarget
-
Feature
08 May 2023
7 ways to mitigate CISO liability and risk
Recent civil and criminal cases have brought CISO liability questions to the fore. Learn how to understand and manage personal risk exposure as a security executive. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Definition
14 Apr 2023
International Information Systems Security Certification Consortium (ISC)2
(ISC)2, short for International Information Systems Security Certification Consortium, is a nonprofit organization that provides security training and certificates. Continue Reading
By- Madelyn Bacon, TechTarget
-
Tutorial
13 Apr 2023
How to use the John the Ripper password cracker
Password crackers are essential tools in any pen tester's toolbox. This step-by-step tutorial explains how to use John the Ripper, an open source offline password-cracking tool. Continue Reading
By- Ed Moyle, Drake Software
-
Opinion
11 Apr 2023
10 hot topics to look for at RSA Conference 2023
RSA Conference 2023 promises another exciting year of cybersecurity discussions and hyperbole. Enterprise Strategy Group's Jon Oltsik shares what he hopes to see at the show. Continue Reading
By- Jon Oltsik, Analyst Emeritus
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Feature
11 Apr 2023
Practice Microsoft SC-100 exam questions with answers
Use these practice multiple-choice questions, with answers, to assess your knowledge of the Microsoft Cybersecurity Architect exam. Continue Reading
By- Kyle Johnson, Technology Editor
- Packt Publishing
-
Feature
11 Apr 2023
How to use Azure AD Connect synchronization for hybrid IAM
Organizations face many challenges authenticating and authorizing users in hybrid infrastructures. One way to handle hybrid IAM is with Microsoft Azure AD Connect for synchronization. Continue Reading
By- Kyle Johnson, Technology Editor
- Packt Publishing
-
Feature
11 Apr 2023
How to prepare for the Microsoft Cybersecurity Architect exam
Before taking the Microsoft Cybersecurity Architect exam, learn about the knowledge areas covered on the SC-100 test, studying recommendations, prerequisites and more. Continue Reading
By- Kyle Johnson, Technology Editor
-
Tip
13 Mar 2023
Is cybersecurity recession-proof?
No field is totally immune to economic downturns, but flexible, practical and prepared cybersecurity professionals should be able to weather any upcoming storms. Continue Reading
By- Jerald Murphy, Nemertes Research
-
Tip
30 Jan 2023
5 ethical hacker certifications to consider
From Offensive Security Certified Professional to GIAC Web Application Penetration Tester, learn about the certifications worth earning to begin your ethical hacker career. Continue Reading
By -
Tip
23 Jan 2023
8 cybersecurity roles to consider
Cybersecurity is an exciting and increasingly important field with a wealth of career opportunities. Explore eight cybersecurity roles and the skills, talent and experience required. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
News
16 Jan 2023
Judge dismisses Chris Hadnagy lawsuit against DEF CON
DEF CON said it wasn't the only infosec conference to receive code-of-conduct complaints about Chris Hadnagy, claiming Black Hat USA removed him from its review board. Continue Reading
By- Rob Wright, Senior News Director
-
Definition
29 Dec 2022
Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)². Continue Reading
By- Peter Loshin, Former Senior Technology Editor
- Taina Teravainen
- Ed Tittel
-
Feature
13 Dec 2022
After the CISO role: Navigating what comes next
Former chief information security officers may have numerous career options available but no clear path forward. Here's how to navigate life after the CISO role. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Tip
12 Dec 2022
As a new CISO, the first 100 days on the job are critical
As a chief information security officer, you won't get a second chance to make a first impression. Learn how a CISO's first 100 days lay the foundation for a successful tenure. Continue Reading
By- Jerald Murphy, Nemertes Research
-
Feature
07 Dec 2022
Understanding malware analysis and its challenges
Discover what to expect in a malware analyst career, from the types of malware you'll encounter to important tools to use to difficulties that arise for those new to the field. Continue Reading
By- Kyle Johnson, Technology Editor
-
Feature
07 Dec 2022
Why is malware analysis important?
Malware continues to plague all organizations, causing data loss and reputational damage. Discover how malware analysis helps protect companies from such attacks. Continue Reading
By- Kyle Johnson, Technology Editor
- Packt Publishing
-
Tutorial
06 Dec 2022
How to use the Hydra password-cracking tool
Need help brute-forcing passwords? Get started by learning how to use the open source Hydra tool with these step-by-step instructions and companion video. Continue Reading
By- Ed Moyle, Drake Software
-
Tip
01 Dec 2022
Top 5 key ethical hacker skills
Ethical hacking can be a rewarding career, but it requires tenacity, curiosity and creativity, among other traits. Oh, and you better be a good writer, too. Continue Reading
By -
Feature
29 Nov 2022
How to maintain security with an understaffed security team
Unsurprisingly, many companies function without a complete security team. Security tasks often fall to others in the organization. Here's some advice for stand-in security members. Continue Reading
By- Sharon Shea, Executive Editor
-
Definition
28 Nov 2022
Common Body of Knowledge (CBK)
In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional should be familiar with, including skills, techniques and best practices. Continue Reading
By- Casey Clark, TechTarget
- Madelyn Bacon, TechTarget
-
Tip
16 Nov 2022
Reality check: CISO compensation packages run the gamut
A capable security executive is invaluable -- a fact organizations increasingly recognize. CISOs' salaries are generally trending up, but the range in compensation is wide. Continue Reading
By- Jerald Murphy, Nemertes Research
-
Answer
08 Nov 2022
3 best professional certifications for CISOs and aspiring CISOs
While one doesn't necessarily need professional cybersecurity certifications to become a CISO, they don't hurt. Explore the best certifications for CISOs and aspiring CISOs. Continue Reading
By- Jerald Murphy, Nemertes Research
-
News
01 Nov 2022
Cisco Networking Academy offers rookie cybersecurity classes
Cisco's cybersecurity track equips students for entry-level positions, including cybersecurity technician, junior cybersecurity analyst, and tier 1 help desk support role. Continue Reading
By- Mary Reines, News Writer
-
Tip
01 Nov 2022
Ideal CISO reporting structure is to high-level business leaders
CISOs usually report to a high-level executive, but reporting to a top-level business executive like the CEO rather than a technology executive protects the business best. Continue Reading
By- John Burke, Nemertes Research
-
Feature
28 Oct 2022
Advice for beginner computer forensic investigators
For those interesting in becoming a computer forensics investigator, learn about the career and what to expect, as well as why digital evidence is the most volatile evidence. Continue Reading
By- Kyle Johnson, Technology Editor
-
Feature
19 Oct 2022
Top 10 pen testing interview questions with answers
Are you pursuing a career in pen testing? Prepare with this list of 10 pen testing interview questions and answers created by three security experts. Continue Reading
By- Isabella Harford, TechTarget
- Packt Publishing
-
Feature
19 Oct 2022
Top IT security manager interview questions
Are you looking for a leadership role in cybersecurity? Three security experts offer their advice on how to answer the most common IT security manager interview questions. Continue Reading
By- Isabella Harford, TechTarget
-
Feature
05 Oct 2022
Top zero-trust certifications and training courses
Most organizations are expected to implement zero trust in the next few years. Learn about zero-trust certifications and trainings that can help prepare your security team. Continue Reading
By- Katie Donegan, Social Media Manager
- Isabella Harford, TechTarget
-
Definition
04 Oct 2022
STEM (science, technology, engineering, and mathematics)
STEM is an educational approach that prepares primary and secondary students for college, graduate study and careers in the fields of science, technology, engineering and mathematics (STEM). Continue Reading
By- Ben Lutkevich, Site Editor
-
Tip
27 Sep 2022
How to get into cybersecurity with no experience
Cybersecurity needs new talent now more than ever, but landing that first job without a computer science degree can still be difficult. Here are five tips for getting in the door. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
Guest Post
26 Sep 2022
Tips for developing cybersecurity leadership talent
Navigating the skills gap from an employer's perspective starts with investing in talent. Get advice on how to develop and hire emerging leaders from an industry analyst. Continue Reading
By- Richard Addiscott
-
Tip
13 Sep 2022
How to become a CISO
The chief information security officer role is growing in profile and importance. Explore six actionable tips for aspiring CISOs as they work toward cybersecurity's top job. Continue Reading
By- Jerald Murphy, Nemertes Research
-
Quiz
09 Sep 2022
Sample CompTIA CASP+ practice questions with answers
Preparing for the CompTIA Advanced Security Practitioner certification or refreshing your knowledge to renew your cert? Use these CASP+ practice questions to test your smarts. Continue Reading
By- Isabella Harford, TechTarget
-
Feature
09 Sep 2022
How to prepare for the CompTIA CASP+ exam
Are you pursuing the CompTIA Advanced Security Practitioner certification? The author of a CASP+ cert guide offers advice on how to prepare for the exam. Continue Reading
By- Isabella Harford, TechTarget
-
Tip
07 Sep 2022
7 CISO succession planning best practices
Nothing is certain except death, taxes and CISO turnover. Learn how to prepare for the inevitable and future-proof your security program with a succession plan. Continue Reading
By- Jerald Murphy, Nemertes Research
-
Tip
01 Sep 2022
Cybersecurity budget breakdown and best practices
Once budget is secured, CISOs must figure out where it should be allocated -- as well as how to justify the costs. Get the lowdown on a cybersecurity budget breakdown here. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
News
18 Aug 2022
Shunned researcher Hadnagy sues DEF CON over ban
Researcher Christopher Hadnagy is seeking damages from DEF CON and founder Jeff Moss over their decision to ban him citing multiple claims of conduct violations. Continue Reading
-
Guest Post
26 Jul 2022
3 ways to help cybersecurity pros avoid burnout
Many security professionals are pushed to their breaking point. Discover three ways employers and managers can help their employees avoid burnout. Continue Reading
By- Chloé Messdaghi
-
News
20 Jul 2022
DOJ report warns of escalating cybercrime, 'blended' threats
The Department of Justice's cyber review report warned that the lines between conventional cybercriminal activity and national security threats have all but disappeared. Continue Reading
-
Feature
05 Jul 2022
How to write a cybersecurity job posting
Is your organization struggling to find cybersecurity talent? Your job descriptions could be the problem. Learn how to write a good cybersecurity job posting. Continue Reading
By- Isabella Harford, TechTarget
- Wiley Publishing
-
Feature
05 Jul 2022
How to find your niche in cybersecurity
It's difficult to navigate a career in cybersecurity, especially with all the varying roles. A veteran CISO offers advice on how to find your niche in the security industry. Continue Reading
By- Isabella Harford, TechTarget
-
Feature
05 Jul 2022
A 'CISO evolution' means connecting business value to security
As cybersecurity has changed, so has the CISO role. 'The CISO Evolution: Business Knowledge for Cybersecurity Executives' aims to help security leaders succeed in the C-suite. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Tip
28 Jun 2022
Negotiating a golden parachute clause in a CISO contract
If a CISO becomes the company scapegoat after a security incident, a strong golden parachute clause can mean the difference between a soft landing and a hard crash. Continue Reading
By- Jerald Murphy, Nemertes Research
-
News
20 Jun 2022
Cleveland BSides takes heat for Chris Hadnagy appearance
The Cleveland BSides security conference is experiencing turmoil after booking a 'surprise' keynote speaker who was recently barred from DEF CON for misconduct. Continue Reading
-
News
17 May 2022
North Korean IT workers targeting US enterprises
North Korean nationals are looking to land jobs at U.S. and European companies to collect sensitive data that could help the reclusive government's military programs. Continue Reading
-
Feature
22 Apr 2022
Unethical vulnerability disclosures 'a disgrace to our field'
The cybersecurity field needs more people who use their powers for good, the lead author of Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition says. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Tip
07 Mar 2022
Top DevSecOps certifications and trainings
Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle. Continue Reading
By- Isabella Harford, TechTarget
-
Feature
28 Feb 2022
Tips for creating a cybersecurity resume
Resumes help candidates leave an impression on potential employers. But did you know one resume often isn't enough? Learn this and other tips for creating a cybersecurity resume. Continue Reading
By- Isabella Harford, TechTarget
- Manning Publications Co.
-
Feature
28 Feb 2022
How to manage imposter syndrome in cybersecurity
The imposter syndrome phenomenon is readily apparent in cybersecurity. Learn how to manage it, along with mishaps to avoid during the job hunt and other career advice. Continue Reading
By- Isabella Harford, TechTarget
-
Definition
16 Feb 2022
security clearance
A security clearance is an authorization that allows access to information that would otherwise be forbidden. Continue Reading
-
News
10 Feb 2022
DEF CON bans social engineering expert Chris Hadnagy
Hadnagy, an influential figure at the DEF CON security conference, was permanently banned following allegations of misconduct at the annual Las Vegas gathering. Continue Reading
-
Feature
02 Feb 2022
A day in the life of a cybersecurity manager
The role of a cybersecurity leader is often misunderstood. Experience a day in the life of a cybersecurity manager with this breakdown of a security leader's typical schedule. Continue Reading
By- Isabella Harford, TechTarget
- O'Reilly Media
-
Feature
02 Feb 2022
Top cybersecurity leadership challenges and how to solve them
Security isn't always a top business priority. This creates challenges for the cybersecurity managers and teams that hope to integrate security into their company's agenda. Continue Reading
By- Isabella Harford, TechTarget
-
Feature
29 Dec 2021
Editor's picks: Top cybersecurity articles of 2021
As we call it a wrap on 2021, SearchSecurity looks at the top articles from the last 12 months and their sweeping trends, including ransomware, career planning and more. Continue Reading
By- Isabella Harford, TechTarget
-
Feature
29 Nov 2021
The components and objectives of privacy engineering
Privacy engineering helps organizations balance business and privacy needs, while mitigating the impact of data breaches. Learn about its components and objectives. Continue Reading
By- Isabella Harford, TechTarget
- Pearson Education
-
Feature
29 Nov 2021
The intersection of privacy by design and privacy engineering
Data privacy concerns are widespread. Privacy by design and privacy engineering help organizations balance privacy with utility and usability. Learn how. Continue Reading
By- Isabella Harford, TechTarget
-
Guest Post
16 Nov 2021
How to create security metrics business leaders care about
Security metrics must be clear, actionable and resonate with business leadership. Learn how to create metrics that business leaders care about and will act upon. Continue Reading
By- Jeffrey Wheatman
-
Feature
26 Oct 2021
5 cybersecurity personality traits for a successful career
In this excerpt of 'Confident Cyber Security,' author Jessica Barker outlines five cybersecurity personality traits employers look for in job candidates. Continue Reading
By- Isabella Harford, TechTarget
- Kogan Page
-
Feature
26 Oct 2021
How to start a career in cybersecurity from the human side
Discover how the co-founder of an infosec consultancy and author of 'Confident Cyber Security' started her career and became a leader in the human nature side of security. Continue Reading
By- Isabella Harford, TechTarget