Education and Careers
Product Marketing Manager
Position description: Location: United States Are you ready to make your mark at an award-winning cybersecurity startup? Eclypsium is seeking an experienced product marketing manager with deep knowledge of the endpoint and ...
Lessons From Teaching Cybersecurity: Week 8
As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a ...
Thirty-Four Years in IT – Why not Thirty-Five?
After I was sidelined (Part 10) we had another leadership turnover. This time the turnover was welcome. I ended up in a leadership position under a new CIO. This allowed me to take advantage ...
Check, Please! Adding up the Costs of a Financial Data Breach
SecurityExpert | | Cyber Crime, Data breach, DLP, email security, encryption, FCA, policies, Security Awareness, training, VIPRE
Guest article by Andrea Babbs, UK General Manager at VIPREReliance on email as a fundamental function of business communication has been in place for some time. But as remote working has become ...
Embracing SaaS Productivity Without Sacrificing Security
Tony Bradley | | cloud-based security, SaaS, SaaS Security, security, Security Awareness, zero trust
We are living in very interesting times. Organizations of all sizes and across all industries have been migrating to the cloud for years. Those that were not already actively engaged in digital ...
Protecting Digital Democracy
With Election Day over, Americans await the final vote counts. As this contentious race coming to a close, securing digital data is now more critical to the democratic process than ever before ...
Tackling the Cybersecurity Resource Problem
Cybersecurity has always been important, but in today’s completely-digital world, it may be safe to say that it matters even more. As the digital footprint and connectivity increases, so do the security ...
Intel Hardware CTF Competitions Drive Innovation for Next-Gen Secure Computing Platforms
The concept of capture the flag competitions goes back hundreds of years from a military perspective, and it has become a staple of hacking and cybersecurity exercises. The basic concept pits teams ...
Survey Sees AI, Automation Cast Shadow Over Security Careers
A survey of 350 security professionals in the U.S., Singapore, Germany, Australia and the United Kingdom suggests younger cybersecurity professionals tend to be more conflicted about advances in artificial intelligence (AI) than ...
Security Boulevard
Chris Eng Talks about the State of Software Security Report
Tony Bradley | | Application Security, Inner Circle, Podcasts, Security Awareness, State of Software Security
TechSpective Podcast Episode 050 “Every company is a software company.” That is the quote that kicks off the Executive Summary page of the latest State of Software Security Report from Veracode. This ...




