How Vulnerable Are Your Mobile Devices?

The rise of cyber crime over the past decade has made organizations of all types nervous, but there’s another area that shouldn’t be left untouched –mobile security.Defending against attacks on smartphones and other mobile devices is an important part of network security – and anyone concerned about cyber crime needs to know what’s happening in this space as well.With so many cyber attacks [...]

2018-11-02T15:54:55+00:00Categories: Cybersecurity|Tags: , , , , |Comments Off on How Vulnerable Are Your Mobile Devices?

Top Paying Cybersecurity Certifications

What certification will give you the most bang for your buck and ensure quick vertical mobility up the corporate ladder? Global Knowledge’s IT Skills and Salary survey addresses that question by reviewing certifications that had a corresponding exam and received at least 115 survey responses. If you are looking to specialize your skillset and [...]

2018-10-04T16:08:31+00:00Categories: Careers, Cybersecurity|Tags: , , , , , , , |Comments Off on Top Paying Cybersecurity Certifications

4 Top High-paying Jobs in Cybersecurity

With more than a billion identities exposed through data breaches, there’s never been a greater need for cybersecurity experts. Which means companies are looking to fill cybersecurity jobs to fill. As a new report from security firm Symantec highlights, cyberattackers are using more sophisticated methods to breach defenses, and increasingly making a very comfortable living. When people [...]

2018-10-04T15:50:00+00:00Categories: Careers, Cybersecurity|Tags: , , , , , , |Comments Off on 4 Top High-paying Jobs in Cybersecurity

6 Specialized Cybersecurity Roles

There’s a serious skills gap in the information security industry. Cybersecurity specialists are hard to come by, causing a major talent shortage in the U.S. To give one example, technology industry data firm CyberSeek estimates that of 128,000 information security analyst openings across the country, only 88,000 are filled. That’s 40,000 empty seats in one of the cybersecurity’s most-advertised [...]

2018-10-04T15:46:45+00:00Categories: Careers, Cybersecurity|Tags: , , , , , |Comments Off on 6 Specialized Cybersecurity Roles

6 Key Cybersecurity Influencers

Look through most lists of influential cybersecurity experts and chances are the names will belong to those working in the technical trenches: the analysts, engineers, and consultants working to beat cyberattacks around the country. Yet we should also consider thought leaders, media and press, and information security governance experts, as well as, the hands-on practitioners. Here are [...]

2018-10-04T15:35:50+00:00Categories: Experts|Tags: , , , |Comments Off on 6 Key Cybersecurity Influencers

Jumpstarting a Career in Cybersecurity: Expert Advice

To open the door to a lucrative career in cybersecurity, the consensus is you’ll need some form of a degree. Beyond that, the routes to various roles vary widely. Three cybersecurity experts in particular have forged very different career paths. Lesley Carhart leads the security incident response team at Motorola Solutions; Daniel Miessler is the client advisory [...]

2018-10-04T15:25:17+00:00Categories: Careers|Tags: , , , , , |Comments Off on Jumpstarting a Career in Cybersecurity: Expert Advice

Cyber Crime Trends to Watch for in 2018

Cyber crime isn’t likely to let up in 2018; industry experts predict it will only increase. Ransomware attacks, hacking of items in the Internet of Things (IoT)– internet-enabled devices attached to common objects, including consumer electronics (such as fitness monitors) and industrial machines – and credential theft will continue to be key methods for hackers. Given this activity, cyber security spending is likely to increase and, [...]

2018-08-21T17:36:39+00:00Categories: Cybersecurity|Tags: , , , |Comments Off on Cyber Crime Trends to Watch for in 2018

Hillary vs. Donald: Cyber Security and the President-Elect

    Cyber security has been at the forefront of the U.S. presidential campaign. Not only has Hillary Clinton been in the hot seat for using an unsecured private email server during her time as Secretary of State, her campaign has been the victim of a series of email hacks from WikiLeaks. There have also been concerns [...]

2017-11-07T14:38:16+00:00Categories: Cybersecurity, Government, News|Tags: , , , , , , |Comments Off on Hillary vs. Donald: Cyber Security and the President-Elect