Education and Careers

Education and Careers

EH-Net - Steph Ihezukwu - BBP: My Path to the CISO Chair

BBP: My Path to the CISO Chair

Testing, testing. May I have your attention, please. *Ahem* Allow me to introduce myself and this new series of articles for The Ethical Hacker Network. My name is Stephanie, better known as ...
Thirty-four years in IT - Swimming with the Itanic (Part 8)

Thirty-four years in IT – Swimming with the Itanic (Part 8)

For historical reasons, we were a strong VMS shop. Before they imploded, Digital Equipment treated EDU's very kindly, offering extremely good pricing on software in exchange for hardware adoption. In essence, a ...

Encryption Will Take Center Stage in 2020

In the past, technology was a topic of discussion primarily among engineers and scientists. Debates would erupt over technology, but they were confined to esoteric conferences, labs or lecture halls. Our connected ...

The Power of Remediating Vulnerabilities in Real-Time

Qualys is a sponsor of TechSpective Zero day exploits make for dramatic headlines, but the reality is that most cyberattacks—particularly the ones responsible for the biggest and most infamous data breaches—tend to ...

Menlo Security Transcends the Almost Secure Cybersecurity Paradigm

Companies of all sizes, across all industries, and from every region of the world all seem to follow the same basic cybersecurity strategy. That would make sense if it worked, but businesses ...
The Training Evaluation Conundrum

The Training Evaluation Conundrum

Stakeholders expect to see a return on their investment in training. In some cases though, they struggle to conceptualize the best way to evaluate the effectiveness of their security awareness training. They ...
cybersecurity salaries

Survey Finds Cybersecurity Salaries Constrained

Despite a global shortage of cybersecurity expertise that is often described as nothing less than chronic, a global salary survey of 1,324 cybersecurity professionals finds nearly half the respondents (48%) earn less ...
Security Boulevard

Cybersecurity New Year’s Resolutions from the Information Security Forum

It’s that time of year again. Time for every one of us to reminisce on the past year and make resolutions for how we can do better in the year ahead–particularly in ...

Start the Year Right with a Security and Privacy Check Up

| | 2fa, cloud api, MFA, Security Awareness, SSH
At some point in the past, I began making new year’s resolutions for doing a bit of personal privacy and security maintenance on New Year’s Day or thereabouts. I would usually have ...

An Unexpected Insider Threat: Senior Executives Who Ignore Cybersecurity Rules

Cybersecurity should be a top concern for any business, with strong policies and protocol put in place, and top executives leading by example. However, recent research has shown that more than half ...
Loading...