With the problematic talent shortage in security, organizations are consistently operating understaffed and team members are forced to pick up the slack, which results in job fatigue and stress. Eric Sheridan, Chief Scientist at WhiteHat Security, offers three strategies for overcoming security burnout.
How can cybersecurity managers effectively identify strategic gaps when 90% of managers have never had strategic management training? Organizations that equip their cyber leaders with the knowledge to think and act strategically improve their chances for long-term success.
Organizations of all sizes are vulnerable to cybersecurity threats, and they need to be able to detect indicators of compromise in order to address risks and respond to attacks. Integrating SIEM and SOAR combines the power of each to create a more robust, efficient and responsive security program – which ultimately allows security teams to avoid alert fatigue.
There are many issues confounding and complicating raising the next generation of technologists. Seven myths exist about technology careers discourage potential teenage technologists and their parents. As a leader of a philanthropic organization dedicated to creating on-ramps to tech careers, Charles Eaton considers busting those myths not only a duty, but a pleasure. Charles tackles these seven myths one-by-one here in his latest ITSPmagazine Experts Corner.
Despite the advances in technology, there’s still a very human element to whether a company embraces security practices. This article examines the impact that organizational culture has on a company's ability to adopt a security-driven mindset and offers some pragmatic tips on overcoming oft-encountered challenges.
How can U.S. companies possibly narrow a tremendously cavernous skills gap in the world of IT security? Social innovation executive and author, Charles Eaton, believes one viable solution is now wending its way through our nation’s middle and high schools. In this 5-part series, Eaton delves into the five keys for “Raising the Next Generation of Technologists” and filling the cybersecurity skills gap in the process.
Connected car technology has been around at least since the mid-1990s, when GM’s OnStar system debuted in 1996. Today, most people think of the connected car as one that is connected to the Internet or some external service for information and entertainment, navigation, and, increasingly, safety. What does this connectivity do to the way we use these vehicles - what is its impact on our our security, our safety?
In this ITSPmagazine An InfoSec Life column, Tadd Wood shares his views on how data—and people—play a role in identifying risk and addressing cybersecurity issues.
Ted Harrington recently ran The Boston Marathon – the oldest, most prestigious, arguably most important marathon in the world. According to Ted, it was by far one of the most fulfilling experiences of his entire life. Throughout the course of preparing for, attempting, and executing this feat, he noticed some striking parallels between running and entrepreneurship. This is his story.
There’s an old joke in the community that there is no patch for the user – technology can be fixed, but human mistakes cannot be overcome. In this new An InfoSec Life article, Joseph Pindar shares his beliefs that peoples’ actions aren’t a problem that can be easily dismissed with a joke.
Cybersecurity offers the chance to protect loved ones from digital evil, and a career devoid of humdrum monotony. Kate Adam shares how she stumbled into this field, and why it’s been the most fulfilling accident of her professional life.
When technology evolves faster than our ability to make sure there's a viable level of safety, how do we educate businesses and the layperson on best practices for IoT security? In this part 2 InfoSec Life article, Phil Agcaoili, CISO, shares his views on the need to raise InfoSec awareness in society while striving for (and embracing) diversity in cybersecurity.
ITSPmagazine recently caught up withJoe Gray, Enterprise Security Consultant at Sword & Shield Enterprise Security. Joe shared his views on personal information sharing, privacy, and the value of community service for information security awareness throughout society.
ITSPmagazine connects with Shehzad Merchant, Gigamon's Chief Technology Officer about his role as CTO for Gigamon, the value of culture in building out a cybersecurity program, and the importance he and his company place on collaboration and innovation beyond traditional R&D roles.
We live in a technology-hungry society where consumers are accustomed to the convenience of technology without understanding the risks and vulnerabilities that come with it. In this part 1 of 2 InfoSec Life articles, Phil Agcaoili, CISO, discusses the five core issues of basic cyber hygiene.
Xuan Zhao, a female data scientist in the information security industry, explains how machine learning dramatically helps her work have a true impact on society, and vice versa.
Amy Brachio knows the challenges of making partner at EY while raising two daughters and caring for ailing parents, but what made it bearable was the professional and personal support she received at every step. As a leader, her goal is to foster an environment that provides the same support for others.
Mandy Huth shares a day in her life as Director of Cybersecurity in order to produce further understanding of the challenges InfoSec professionals face and how we might overcome them.
The founder of “Code Like A Girl” explains the overt sexism she experienced growing up, later in college and in the corporate world merely due to her gender, which made her only more determined to make strides for women who are interested in a tech-oriented career.
An IT security professional realizes that his life’s mission to protect information harks back to being a curious youngster who absconded his teacher’s log-in credentials and then poked around the school’s rudimentary computer network. Little did he know, a rewarding career lay ahead.