Security roles News
December 07, 2017
A new initiative plans Army cyber officer hiring over the course of five years, but experts are skeptical it can attract the best candidates away from the private sector.
October 23, 2017
At the 2017 ISSA International Conference, experts urged companies to recruit from existing IT staff to confront the looming cybersecurity talent shortage.
September 30, 2016
In part two of his interview with SearchSecurity, MobileIron's James Plouffe talks about his role as a technical consultant on 'Mr. Robot' and how the show achieves its authenticity.
May 31, 2016
With the explosion of the Internet of Things, it's time to rethink the CISO role -- including who that role reports to. This was the consensus of a panel of security leaders at this month's MIT ...
Security roles Get Started
Bring yourself up to speed with our introductory content
Grassroots efforts to shift cultural thinking in information security have had a positive effect, the former professor of computer engineering says. Continue Reading
Spotlight article: Shon Harris explains the core concepts in the CISSP domain on software development security, including models, methods, database systems and security threats. Continue Reading
The Certified Information Security Manager certification has been around for over a decade now, and it's only grown in prominence. What makes the ISACA CISM so important and how does it compare to its peers? Continue Reading
Evaluate Security roles Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Reassessing the CISO-CIO reporting structure could prove to be a vital step in boosting an organization's data protection strategy, according to cybersecurity expert Tarah Wheeler. Continue Reading
Channel firms say security talent is hard to find and expensive to acquire. Learn how executives are overcoming the cybersecurity skills gap. Continue Reading
From April through mid-May 2017, HIMSS North America commissioned a survey on the topic of healthcare cybersecurity. The HIMSS cybersecurity survey received feedback from 126 information security ... Continue Reading
Manage Security roles
Learn to apply best practices and optimize your operations.
Serving as White House deputy CIO prepared Johnson for her CISO role: "When we let the culture in a company or agency drive security governance or innovation, that's a problem." Continue Reading
In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, author Roland Cloutier discusses the primary role of the chief security officer. Continue Reading
As data threats continue to proliferate in scope and number, end-user security awareness is essential to corporate information protection. Continue Reading
Problem Solve Security roles Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
An information security manager has access to many privileged systems in an organization, so letting one go can be tricky. Expert Mike O. Villegas explains how to handle the process. Continue Reading
Some companies are trying to head off information security glitches before they sign on the dotted line, with help from security officers. Continue Reading
A rise in specialized roles puts extra pressure on security hiring. Expert Mike O. Villegas explains how to meet this demand and find talented security professionals. Continue Reading