Thursday, April 15, 2021
  • Securing APIs: Empowering Security
  • New integration: MSPs can now manage Acronis via Kaseya VSA
  • How Individualism Ruins Democracy
  • Are Banks Spending Their Cybersecurity Budgets in the Right Place?
  • Segurança sob ataque: Padrões perigosos que colocam seu ambiente em risco

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Addressing The Elephant in the Room: Cybersecurity’s Increasing Talent Shortage

Addressing The Elephant in the Room: Cybersecurity’s Increasing Talent Shortage

by Tripwire Guest Authors on January 14, 2019

The cybersecurity space is in dire straits. Hackers are getting smarter and more sophisticated…and the availability of skilled men and women to combat them has never been lower. It’s an issue that’s been slowly growing worse year over year, yet there’s no clear solution in sight. What’s a business leader to do?

The good news is that there’s never been a better time to be a cybersecurity expert.

That bad news is that it’s because the market for cybersecurity professionals has never been tighter. As noted by Gartner senior research analyst Sam Olyaei, the unemployment rate for men and women with cybersecurity expertise is almost zero. There are more jobs than there are people to fill them; this skills gap is going to get worse before it gets better.

“If you’re a cybersecurity professional with any kind of skill set, you already have a job and multiple offers on the table,” Olyaei explained at last year’s Gartner Security & Risk Assessment Summit. “The talent shortage is here and it’s here to stay. It’s not going away, so we can either confront it or be left behind and lose our seat at the table.”

Therein lies the problem, though. How exactly does one confront it? After all, as a small business, you might not necessarily even have the necessary budget to hire a dedicated cybersecurity professional.

Here’s the thing, though – you need to do everything in your power to make the funds available. Large data breaches might make more headlines, but small businesses are targeted and successfully hacked far more often. Criminals know that a lot of smaller organizations don’t have big cybersecurity budgets.

That’s why 58% of malware victims are small businesses. It’s why 61% of small businesses experienced a cyber attack in 2017. And it’s why (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/off-topic/addressing-the-elephant-in-the-room-cybersecuritys-increasing-talent-shortage/

January 14, 2019January 15, 2019 Tripwire Guest Authors Connecting Security to the Business, Cybersecurity, Off Topic, Skills, Talent
  • ← The FCC and Call Authentication
  • Can Smart Home Leaks Lead to Major Cyberattacks? →

TechStrong TV – Live

Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again)
Nation-State Cyberthreats Persist
Visibility, Context, Automation are Key to Security Control
Identity Management Day: Cybercriminals No Longer Hack in, They Log In
Hackers Leak Hacker Data in Swarmshop Breach
Top-21 Cybersecurity Experts You Must Follow on Twitter in 2021
GUEST BLOG: Secure your data for cyber resilience
Mayhem for API ❤️ GitHub: Seamless DevSecOps for your REST APIs
How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls
Endpoint Isolation: Can endpoints be hardened while keeping users productive?

Upcoming Webinars

Fri 16

Expect More From Your AppSec Vendor

April 16 @ 1:00 pm - 2:00 pm
Wed 21

Managing Open Policy Agent at Scale

April 21 @ 3:00 pm - 4:00 pm
Thu 22

A New Approach to Secure Web Gateways

April 22 @ 11:00 am - 12:00 pm
Mon 26

The Kubernetes Network (Security) Effect

April 26 @ 9:00 am - 10:00 am
Mon 26

Application Security: Moving at the Speed of DevOps

April 26 @ 1:00 pm - 2:00 pm
Wed 28

Cyber Attacks From the Open Source Perspective

April 28 @ 1:00 pm - 2:00 pm
Thu 29

Hack My Java Application: Demonstrating How Snyk and Red Hat Help Developers Stay Performant and Secure

April 29 @ 11:00 am - 12:00 pm
May 05

Managing Permissions and Entitlements is at the Core of a Zero Trust Model in the Cloud

May 5 @ 3:00 pm - 4:00 pm

More Webinars

Download Free eBook

7 Must-Read eBooks for Security Professionals

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Breach Clarity Weekly Data Breach Report: Week of April 12
Cybersecurity Data Security Identity & Access Industry Spotlight Security Boulevard (Original) Threats & Breaches 

Breach Clarity Weekly Data Breach Report: Week of April 12

April 14, 2021 Kyle Marchini | 1 day ago 0
Securing Remote Health Care Post-COVID-19
Cloud Security Cybersecurity Data Security Governance, Risk & Compliance Industry Spotlight Mobile Security Security Boulevard (Original) 

Securing Remote Health Care Post-COVID-19

April 14, 2021 Mike Nelson | 1 day ago 0
Salesforce DevSecOps: Avoiding Arrested Development
Application Security Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

Salesforce DevSecOps: Avoiding Arrested Development

April 13, 2021 Waqas Nazir | 2 days ago 0

Top Stories

YT$AW: FBI Cleans Up Exchange Servers, NSA Tips Microsoft 4 More Bugs
Analytics & Intelligence Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Incident Response Malware Network Security News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

YT$AW: FBI Cleans Up Exchange Servers, NSA Tips Microsoft 4 More Bugs

April 14, 2021 Richi Jennings | 1 day ago 0
Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again)
Analytics & Intelligence Application Security AppSec Cyberlaw Cybersecurity Deep Fake and Other Social Engineering Tactics Endpoint Featured Governance, Risk & Compliance Identity & Access Identity and Access Management Incident Response IoT & ICS Security Malware Network Security News Securing the Edge Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again)

April 12, 2021 Richi Jennings | 3 days ago 0
Facebook Sucks: Huge 500M-User Breach ‘Is Your Fault’
Analytics & Intelligence Application Security AppSec Cloud Security Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access Incident Response News Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Facebook Sucks: Huge 500M-User Breach ‘Is Your Fault’

April 8, 2021 Richi Jennings | Apr 08 0

Security Humor

via   the the webcomic talent of the inimitable   Daniel Stori   at   turnoff.us  !

Daniel Stori’s ‘Security Expert’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2021 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.