Thursday, June 1, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • Are Internet Providers 'Aiding and Abetting' Crimes?
  • Not your average Joe: An analysis of the XeGroup’s attack techniques
  • Cyberinsurance Prices Moderate as Premium Hikes Slow
  • CyRC Vulnerability Advisory: CVE-2023-32353, Apple iTunes local privilege escalation on Windows
  • Avoid The Hack: 6 Best Privacy Browser Picks for Linux and macOS
Security Bloggers Network 

Home » Security Bloggers Network » Addressing The Elephant in the Room: Cybersecurity’s Increasing Talent Shortage

SBN

Addressing The Elephant in the Room: Cybersecurity’s Increasing Talent Shortage

by Tripwire Guest Authors on January 14, 2019

The cybersecurity space is in dire straits. Hackers are getting smarter and more sophisticated…and the availability of skilled men and women to combat them has never been lower. It’s an issue that’s been slowly growing worse year over year, yet there’s no clear solution in sight. What’s a business leader to do?

DevOps ConnectSponsorships Available

The good news is that there’s never been a better time to be a cybersecurity expert.

That bad news is that it’s because the market for cybersecurity professionals has never been tighter. As noted by Gartner senior research analyst Sam Olyaei, the unemployment rate for men and women with cybersecurity expertise is almost zero. There are more jobs than there are people to fill them; this skills gap is going to get worse before it gets better.

“If you’re a cybersecurity professional with any kind of skill set, you already have a job and multiple offers on the table,” Olyaei explained at last year’s Gartner Security & Risk Assessment Summit. “The talent shortage is here and it’s here to stay. It’s not going away, so we can either confront it or be left behind and lose our seat at the table.”

Therein lies the problem, though. How exactly does one confront it? After all, as a small business, you might not necessarily even have the necessary budget to hire a dedicated cybersecurity professional.

Here’s the thing, though – you need to do everything in your power to make the funds available. Large data breaches might make more headlines, but small businesses are targeted and successfully hacked far more often. Criminals know that a lot of smaller organizations don’t have big cybersecurity budgets.

That’s why 58% of malware victims are small businesses. It’s why 61% of small businesses experienced a cyber attack in 2017. And it’s why (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/off-topic/addressing-the-elephant-in-the-room-cybersecuritys-increasing-talent-shortage/

January 14, 2019January 15, 2019 Tripwire Guest Authors Connecting Security to the Business, Cybersecurity, Off Topic, Skills, Talent
  • ← The FCC and Call Authentication
  • Can Smart Home Leaks Lead to Major Cyberattacks? →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Thu 01

Simplify, Secure, Strengthen: Implementing Zero-Trust Across Your Endpoints

May 17 @ 1:00 pm - July 12 @ 2:00 pm
Mon 05

Securing Open Source

June 5 @ 1:00 pm - 2:00 pm
Thu 08

ActiveState Workshop: Building Secure and Reproducible Open Source Runtimes

June 8 @ 1:00 pm - 2:00 pm
Tue 13

Uncovering the Hidden Cybersecurity Threat in Your Organization

June 13 @ 1:00 pm - 2:00 pm
Wed 14

Enrich Security Investigations With ServiceNow Asset Data in Snowflake

June 14 @ 3:00 pm - July 24 @ 4:00 pm
Thu 15

Securing Containers & Kubernetes With AWS And Calico

June 15 @ 3:00 pm - 4:30 pm
Thu 22

Strange Bedfellows: Software, Security and the Law

June 22 @ 11:00 am - 12:00 pm
Thu 22

Sneak Peek: Cloud Security Prioritized With Sonrai

June 22 @ 1:00 pm - 2:00 pm
Thu 22

Unleash the Potential of Your Log and Event Data, Including AI’s Growing Impact

June 22 @ 3:00 pm - 4:00 pm
Jul 24

Identity and Access Management

July 24 @ 1:00 pm - 2:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

Understanding the Progression of a Ransomware Attack
‘Predator’ — Nasty Android Spyware Revealed
Failure to Pay Ransom: Negligence?
Making a Case for Single-Vendor SASE
Legacy AppSec Tools Getting Lost in the Cloud
Utilizing SEC Cybersecurity Rule and CISA Directive | anecdotes
From Data Chaos to Data Mastery How to Build and Scale Data Lakes with AWS Services
Why Attackers Target the Gaming Industry
Meta’s $1.3 Billion Fine, AI Hoax Hysteria, Montana’s TikTok Ban
The Top Threats to Cloud Infrastructure Security and How to Address Them

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

‘Predator’ — Nasty Android Spyware Revealed
Analytics & Intelligence API Security Cyberlaw Cybersecurity Data Security Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Predator’ — Nasty Android Spyware Revealed

May 30, 2023 Richi Jennings | 1 day ago 0
Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift
Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Industry Spotlight News Security Boulevard (Original) Spotlight 

Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift

May 23, 2023 Michael Vizard | May 23 0
Facebook Fined $1.3B — Zuckerberg Furious in GDPR Fight
Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threats & Breaches 

Facebook Fined $1.3B — Zuckerberg Furious in GDPR Fight

May 22, 2023 Richi Jennings | May 22 0

Top Stories

COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
Analytics & Intelligence API Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response IOT IoT & ICS Security Malware Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT

May 26, 2023 Richi Jennings | May 26 0
Federal Appellate Court Approves ‘Pretext’ Border Search
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access News Security Boulevard (Original) 

Federal Appellate Court Approves ‘Pretext’ Border Search

May 26, 2023 Mark Rasch | May 26 0
U.S.-South Korea Forge Strategic Cybersecurity Framework
Cybersecurity Featured Governance, Risk & Compliance News Security Boulevard (Original) Spotlight Threat Intelligence 

U.S.-South Korea Forge Strategic Cybersecurity Framework

May 25, 2023 Christopher Burgess | May 25 0

Security Humor

Randall Munroe’s XKCD ‘Wikipedia Article Titles’

Randall Munroe’s XKCD ‘Wikipedia Article Titles’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.