Career development News
June 08, 2017
The latest Cisco recertification program adds continuing education as an option to keeping the CCIE and CCDE current. But the cost of courses will make the offering expensive.
June 07, 2017
Creating more world class graduate and post graduate apprenticeships is more important than enabling unskilled students to graduate with less debt.
May 31, 2017
CIOs and other executives discuss cracking the gender-diversity problem in IT at the recent MIT Sloan CIO Symposium.
May 26, 2017
In this guest post, Susan Bowen, vice president and general manager at Cogeco Peer 1 and new trustee at education technology solutions organisation Jisc, explains her journey into the technology ...
Career development Get Started
Bring yourself up to speed with our introductory content
If you're looking into a QA career or find yourself already there, this guide navigates the ever-changing software testing world with steps for moving forward as a QA pro. Continue Reading
Security leadership abilities are hard to quantify. Certifications and degrees may ease the way into a career in cybersecurity, but hard-won experience is usually the surer path into a role that can influence meaningful change in today's complex environments. Whether they report into the CIO or outside of the IT organization, CISOs handle growing levels of responsibilities as evolving threats and infrastructures mean higher risk and no room for staff shortages. In this Information Security issue on cybersecurity careers, we look at the path to CISO. What are the measures of success or failure in this positon? Is it worth it?
As more Fortune 5000 companies seek CISOs to handle cybersecurity concerns, larger organizations in financial services and defense industries have piqued everyone's interest with their continued investment in the human factor -- the je ne sais quoi that results in successful threat hunting. While many definitions of hunting can be found, threat hunters essentially search for the traces attackers leave behind in an IT environment, usually before any alerts of their activities are generated by security devices.
"I used to think that only the best security operations center people could be threat hunters, but that's not always true," said Anton Chuvakin, a Gartner research vice president. "The best SOC analyst may be good at responding to alerts, but they don't always have the creativity that's needed."
As automation and machine learning gain hold, technology is still no substitute for security leadership abilities and cybersecurity talent. In this issue of Information Security magazine, we look at cybersecurity careers and the best ways to build top-notch security organizations.Continue Reading
Tasked with security and compliance, Lucia Milica Turpin watches over internal systems and remote communications customers entrust to the video conferencing company. Continue Reading
Evaluate Career development Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Experienced virtualization admins should consider the facts: The cloud is running traditional virtualization off the road. Change lanes before yours disappears. Continue Reading
The 'war for talent' has started and talent management systems are here to help. See how they help businesses grow by recruiting, developing and retaining employees. Continue Reading
Most cloud access security brokers offer CISOs a way to set policy and gain better understanding of multiple cloud services and data in use across the enterprise. As CASBs have gained momentum in recent years, use cases for them have expanded. Do these tools fill the gaps around visibility and control of software as a service and other cloud services?
Although cloud service visibility and data leak protection continue to be the biggest drivers, cloud access security brokers can do more than just help with your shadow IT problem and unsanctioned application activity in the cloud.
Organizations are increasingly looking to use cloud access security brokers to identify anomalies in data movement between on-premises and cloud apps as well as multiple cloud services. Malware identification and encryption of data have become important. More enterprises are also beginning to use CASBs or similar intermediary security technologies to provide some level of security policy management for custom identity-as-a-service platforms.
In this issue of Information Security magazine, we look at cloud access security brokers and the best ways to evaluate new models, such as infrastructure as a service and platform security.Continue Reading
Manage Career development
Learn to apply best practices and optimize your operations.
IT operations professionals with accumulated skills in application management, cloud migration or security enforcement could make a forward move to one of these specialist roles. Continue Reading
Hamza Abib has 18 Salesforce certifications and is aiming to earn all 25. But his Salesforce consultant certification provides a foundation that informs all of his work. Continue Reading
With some reports showing incredibly short tenures, new CISOs barely have time to make their mark. The salaries are good; the opportunities for the right skills, unlimited. Continue Reading
Problem Solve Career development Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Eric Patterson, executive director of the SANS Technology Institute, explains why it's time to rethink educational development to strengthen the cybersecurity workforce. Continue Reading
It can be frustrating and demoralizing when you're not chosen to test the latest and most interesting software. Expert Gerie Owen shares what to do about it. Continue Reading
You want to move your testing career forward, but your employer isn't helping. Expert Gerie Owen offers advice about taking charge of your career development. Continue Reading