Careers

Why Cybersecurity Pros Need to Be Good Storytellers

Like storytelling, data visualization can be used to provide a narrative about your organization’s cybersecurity posture. Cybersecurity is never a…

2 days ago

HP Moves to Increase Desktop and Printer Security Lead with Bromium

HP just announced the acquisition of Bromium, a unique small security company. I must admit the name “Bromium” kind of…

4 days ago

What you should know about Ryuk ransomware

Introduction The ransomware called Ryuk has established ransomware as a lucrative enterprise product. This sentence may sound provocative, as it…

6 days ago

Networking the Cyber Skills Gap

Closing the skills gap in cybersecurity requires both technology and human involvement That the security industry is cripplingly understaffed is…

6 days ago

Managing the Chaos of Digital Certificates

Qualys is a sponsor of TechSpective Organizations are stuck in the middle when it comes to digital certificates. Certificates are…

1 week ago

A Guide on 5 Common LinkedIn Scams

The fact that scammers haunt Facebook and Twitter is not surprising. Even so, digital criminals don’t stop with just those…

1 week ago

Skill Sets for Transitioning into a Cybersecurity Career

Changing careers is never easy. How long or far you have already traveled down your particular career path can make…

2 weeks ago

HP Labs Bristol: Why HP Leads On PC Security

I spent much of this week at HP’s Labs in Bristol England and this site, focused on security, is largely…

2 weeks ago

Think Outside the Box to Close the Skills Gap

The skills gap in cybersecurity is a topic I address a lot, but it is also one of the issues…

2 weeks ago

What to Do If You Receive a Legitimate “Unusual Account Activity” Notice

Sadly, it’s all too common for consumers to receive notices of “unusual account activity” these days. Yes, service providers might…

2 weeks ago