Preventing cybersecurity employee burnout and churn: 6 tips for managers

Introduction “Burnout” and “churn” are two words that probably send shivers down the spines of most cybersecurity managers. After all, employees who are “feeling the burn,” so to speak, abandon their... Go on to the site to read the full article ... Read More

Digital forensics and incident response: Is it the career for you?

Introduction When many of us think of detective work, we conjure up images of trench-coated detectives chasing bad guys down darkened alleyways or poring over black-and-white crime scene photos.... Go on to the site to read the full article ... Read More

Podcast/webinar recap: What’s new in ethical hacking?

Introduction Ethical hackers are at the front lines of the battle against cybercriminals. Since new forms of malware, APTs and ransomware are emerging every day, it’s critical that ethical hackers... Go on to the site to read the full article ... Read More

5 takeaways from Bitdefender’s 2019 Hacked Off! report

Introduction What’s the best way to fend off advanced cyberattacks? What keeps information security professionals awake at night? How do they rate their knowledge of cybersecurity issues? These... Go on to the site to read the full article ... Read More

How to build hands-on cybersecurity skills on a budget

Introduction Cybersecurity is a constantly changing field, so a passion for lifelong learning is a must for infosec professionals. Staying ahead of the bad guys means keeping up with the changing... Go on to the site to read the full article ... Read More

6 tips for getting a salary increase in cybersecurity

Whether you’re saving up for a dream house or simply want some extra spending money on the weekend, getting a salary raise in cybersecurity will certainly help you achieve your financial goals.... Go on to the site to read the full article ... Read More

ICS/SCADA Social Engineering Attacks

Introduction ICS/SCADA systems are essential to the daily operations of utility companies and industrial manufacturers. Due to their importance, these vulnerable systems are targets for attack. These... Go on to the site to read the full article ... Read More

Cyber Work Podcast: Growing the number of women in cybersecurity with Olivia Rose

Introduction Cybersecurity is a field on the cutting edge, yet when it comes to gender parity, there’s still much progress to be made. For women, breaking into a male-dominated field like... Go on to the site to read the full article ... Read More

Overview of Phishing Techniques: Fake Websites

| | Phishing
Introduction It’s an average Tuesday afternoon when you get an email from your bank. The fraud team is reaching out because they detected some unusual purchasing activity on your account. Can you... Go on to the site to read the full article ... Read More

Cyber Work Podcast: Cybersecurity reporting and closing the skills gap with Dark Reading’s Kelly Sheridan

Introduction The need for talented cybersecurity professionals is on the rise, but a huge amount of job postings go unfilled. Why is that? Cybersecurity is in the midst of a “skills gap,” a situation... Go on to the site to read the full article ... Read More
Loading...