Careers and certifications
Security admins, pen testers and CISOs are a few of many potential cybersecurity careers. Get advice on making a career choice and finding the trainings and certifications -- such as Security+, CISSP and CCSK -- needed to land an infosec job, along with guidance on succeeding in a security profession.
Top Stories
- 
				News
					19 Aug 2025
					
								  How an AI-based 'pen tester' became a top bug hunter on HackerOneAI researcher explains how an automated penetration-testing tool became the first non-human member on HackerOne to reach the top of the platform's US leaderboard. Continue Reading - 
				Tutorial
					01 Aug 2025
					
									
										  How to use the John the Ripper password crackerPassword crackers are essential tools in any pen tester's toolbox. This step-by-step tutorial explains how to use John the Ripper, an open source offline password-cracking tool. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                Feature
                29 Jul 2025
                  8 cybersecurity conferences to attend in 2025Cybercriminals create new ways to steal information regularly, creating cybersecurity challenges. Attending conferences is one way to learn about these trends for the best defense. Continue Reading By- Rosa Heaton, Content Manager
- Sarah Amsler, Senior Managing Editor
- Amanda Hetler, Senior Editor
 
- 
                Feature
                28 Jul 2025
                  How to become a bug bounty hunterWith the right strategy, tools and skills, software testers and security researchers can earn extra income as bug bounty hunters. Continue Reading By- Rob Shapland
- Alissa Irei, Senior Site Editor
 
- 
                Tip
                23 Jul 2025
                  Top DevSecOps certifications and trainings for 2025DevOps Institute, Practical DevSecOps, EXIN and EC-Council are among the organizations that offer DevSecOps certifications and trainings for cybersecurity professionals. Continue Reading 
- 
                Definition
                21 Jul 2025
                  What is a CISO (chief information security officer)?The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program. Continue Reading By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
 
- 
                News
                17 Jul 2025
                  Women who 'hacked the status quo' aim to inspire cybersecurity careersA group of female cybersecurity pioneers will share what they've learned about navigating a field dominated by men, in order to help other women empower themselves and pursue successful cybersecurity careers. Continue Reading - 
                Definition
                15 Jul 2025
                  What is cybersecurity?Cybersecurity is the practice of protecting systems, networks and data from digital threats. Continue Reading By- Kinza Yasar, Technical Writer
- Sharon Shea, Executive Editor
- Alexander S. Gillis, Technical Writer and Editor
 
- 
                Definition
                09 Jul 2025
                  What is a CISO as a service (CISOaaS)?CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Ben Lutkevich, Site Editor
 
- 
                Tip
                01 Jul 2025
                  Cybersecurity career path: A strategic guide for professionalsThere's no single path for everyone, but knowing what employers look for and following these best practices can help you move up the cybersecurity career ladder. Continue Reading By
- 
                Feature
                30 Jun 2025
                  Enterprise cybersecurity: A strategic guide for CISOsCISOs and others responsible for safeguarding an organization's systems, networks and data need to manage day-to-day threats while also planning strategically for what's ahead. Continue Reading By- Phil Sweeney, Industry Editor
- Craig Stedman, Industry Editor
 
- 
                Tip
                27 Jun 2025
                  The CISO evolution: From security gatekeeper to strategic leaderAmid accelerating digital transformation and growing regulatory pressure, leading CISOs have emerged from behind the scenes and taken the stage as influential business leaders. Continue Reading By- Jerald Murphy, Nemertes Research
 
- 
                Definition
                27 Jun 2025
                  What is a virtual CISO (vCISO)? Does your business need one?The virtual chief information security officer (vCISO) is a C-suite-level security professional or service provider who offers CISO-level expertise on a part-time, remote or contractual basis. Continue Reading 
- 
                Tip
                27 Jun 2025
                  Cybersecurity skills gap: Why it exists and how to address itThe cybersecurity skills shortage is putting enterprises at risk. Worse, it shows no sign of abating. Here is why it's happening and what employers can do to mitigate the problem. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Definition
                25 Jun 2025
                  What is a virtual CISO (vCISO)? Does your business need one?The virtual chief information security officer is a C-suite-level security professional or service provider who offers CISO-level expertise on a part-time, remote or contractual basis. Continue Reading 
- 
                Feature
                24 Jun 2025
                  CISO burnout: How to balance leadership, pressure and sanityWith CISO burnout comes increasing cyber incidents and costly leadership turnover. Organizations must invest in support to prevent this growing security risk. Continue Reading By- Rosa Heaton, Content Manager
 
- 
                Tip
                24 Jun 2025
                  Cybersecurity governance: A guide for businesses to followCybersecurity governance is now critical, with NIST CSF 2.0 recently adding it as a dedicated function. Learn why governance is core to an effective cyber strategy. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Tip
                16 Jun 2025
                  5 essential programming languages for cybersecurity prosCoding is an important skill across almost every technology discipline, and cybersecurity is no exception. Learn about the top programming languages for security professionals. Continue Reading By- Mike Chapple, University of Notre Dame
 
- 
                Tutorial
                16 Jun 2025
                  Hydra password-cracking tool: How to download and use it for goodEthical hackers, need help brute forcing passwords? Learn how to download and use the open source Hydra password-cracking tool with this step-by-step tutorial and companion video. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                Tip
                02 Jun 2025
                  The DOGE effect on cybersecurity: Efficiency vs. riskThe DOGE effect on security is a complex issue. Pursuit of efficiency might be a legitimate goal, but experts caution it can conflict with cybersecurity defenses. Continue Reading By
- 
                Video
                02 Jun 2025
                  The DOGE effect on cyber: What's happened and what's next?In this webinar, part of 'CISO Insights' series, cybersecurity experts debate the pros and cons of the Department of Government Efficiency's actions and the impact on their field. Continue Reading By
- 
                Tip
                20 May 2025
                  Best practices for board-level cybersecurity oversightCorporate boards must play an increasingly active role in overseeing cybersecurity strategies. Here's what they need to know, from SEC disclosure requirements to best practices. Continue Reading By- Jerald Murphy, Nemertes Research
 
- 
                Feature
                13 May 2025
                  5 top mobile security courses and certifications for ITTo stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more. Continue Reading By- Katie Fenton, Site Editor
 
- 
                News
                29 Apr 2025
                  From mission-centric to people-centric: Competitive leadership in cyberMaking a case for empathy in cyber-leadership roles as a strategic business advantage. Continue Reading - 
                Tip
                05 Feb 2025
                  Comparing top identity and access management certificationsHolding an identity and access management certification demonstrates knowledge of security fundamentals, plus it can yield rewarding career and networking opportunities. Continue Reading By- Paul Kirvan
- Katie Donegan, Social Media Manager
 
- 
                Tip
                22 Jan 2025
                  10 cybersecurity certifications to boost your career in 2025A consensus of industry professionals rank these 10 security certifications as the most coveted by employers and security pros -- plus links to 10 vendor security certifications. Continue Reading By- Steve Zurier, ZFeatures
 
- 
                Tip
                14 Jan 2025
                  Top 12 online cybersecurity courses for 2025Our panel of experts picked the best free and paid online cybersecurity courses for professionals looking to advance their careers and for newbies breaking into the field. Continue Reading By- Steve Zurier, ZFeatures
 
- 
                Tip
                13 Jan 2025
                  10 must-have cybersecurity skills for career success in 2025Looking to advance your cybersecurity career? Here are the skills you need to win a CISO job, land a threat hunter gig and snag other security positions in high demand. Continue Reading By- Steve Zurier, ZFeatures
 
- 
                Feature
                13 Jan 2025
                  Top 8 in-demand cybersecurity jobs for 2025 and beyondCybersecurity is a challenging career path, filled with professional opportunities. Learn about the top cybersecurity jobs and the training and background they require. Continue Reading By
- 
                News
                06 Jan 2025
                  Amit Yoran, Tenable CEO and cybersecurity advocate, dies at 54Amit Yoran was a decades-long practitioner of cybersecurity and previously held key roles at the U.S. Department of Homeland Security, RSA Security and NetWitness. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Tip
                06 Jan 2025
                  Top 4 incident response certifications to consider in 2025Cybersecurity professionals pursuing an incident response track should consider the following certifications to bolster their knowledge and advance their career. Continue Reading By
- 
                Tip
                17 Dec 2024
                  The 10 best cloud security certifications for IT pros in 2025Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal. Continue Reading By- Sharon Shea, Executive Editor
 
- 
                Guest Post
                13 Dec 2024
                  How AI is shaping the future of the cybersecurity workforceISACA's 'State of Cybersecurity 2024' report found that, while AI helps automate lower-level tasks, it presents issues when it comes to succession planning and talent development. Continue Reading By- Sushila Nair
 
- 
                Definition
                03 Dec 2024
                  What is Cisco Certified Internetwork Expert (CCIE) certification?Cisco Certified Internetwork Expert (CCIE) certification is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures. Continue Reading By- Stephen J. Bigelow, Senior Technology Editor
- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
 
- 
                Tip
                19 Nov 2024
                  What skills are needed for a successful career in IAM?In the zero-trust era, identity management is critical to an organization's cybersecurity posture. What skills are required to transition into a career in IAM? Continue Reading By- Amy Larsen DeCarlo, GlobalData
 
- 
                Video
                13 Nov 2024
                  An explanation of ethical hackersEthical hackers protect businesses by identifying vulnerabilities. They use the same techniques as malicious hackers, but for the greater good. Continue Reading By- Kaitlin Herbert, Content writer
 
- 
                Feature
                07 Nov 2024
                  15 IAM interview questions to prep for your next career moveThe job market for identity and access management positions is strong right now, but the competition could be tough. Use these 15 questions to guide your interview prep. Continue Reading 
- 
                Tip
                30 Oct 2024
                  Top AI security certifications to considerAI security certifications, much like AI itself, are evolving. Does it make sense to go through the time and money to obtain a credential, given how quickly the field is changing? Continue Reading By- Jerald Murphy, Nemertes Research
- Sharon Shea, Executive Editor
 
- 
                Feature
                30 Oct 2024
                  Diversity in leadership: Forge your own successEugina Jordan is a CMO in tech who wrote a leadership book for underrepresented professionals who want to become corporate leaders. Here, she answers four questions about the book. Continue Reading By- Natasha Carter, Director of Partnerships and Event Content
 
- 
                Feature
                24 Oct 2024
                  Equipment to include in a computer forensic toolkitComputer forensic investigators require more than software to do their job. Learn what equipment constitutes a complete computer forensic toolkit. Continue Reading By- Kyle Johnson, Technology Editor
- Packt Publishing
 
- 
                News
                17 Oct 2024
                  Joe Sullivan: CEOs must be held accountable for security tooThe former CSO at Uber was found guilty in 2022 of obstruction of justice relating to a breach. Now he's calling for clearer regulatory frameworks for security. Continue Reading By- Nicole Laskowski, Senior News Director
 
- 
                Definition
                11 Oct 2024
                  What are CPE (continuing professional education) credits?Continuing professional education, or CPE, credit is a term referring to the points professionals receive for participating in specialized training in IT and other fields. Continue Reading 
- 
                Tip
                19 Sep 2024
                  6 cybersecurity soft skills to elevate your careerCybersecurity professionals have the technical skills to protect their corporate networks, but they also need to master certain soft skills if they truly want to be effective. Continue Reading By
- 
                Tip
                30 Aug 2024
                  4 AI cybersecurity jobs to consider now and in the futureNow hiring: At the intersection of AI and cybersecurity, career opportunities are emerging. Explore four new jobs that combine AI and security expertise. Continue Reading By- Amy Larsen DeCarlo, GlobalData
 
- 
                Feature
                06 Aug 2024
                  9 AI-proof IT jobs, plus how to be irreplaceableAs automation and artificial intelligence tools do more work in more organizations, some technologists are worried AI will take their job. Learn which jobs are safest and why. Continue Reading By
- 
                Tip
                16 Jul 2024
                  What a cybersecurity analyst does and how to become oneSecurity analysts play a critical role in defending organizations' sensitive information from cyberattacks. Learn more about the position and how to pursue it. Continue Reading By- Andrew Froehlich, West Gate Networks
 
- 
                Tip
                01 Jul 2024
                  Top 10 cybersecurity interview questions and answersInterviewing for a job in cybersecurity? Memorizing security terms won't cut it. Here are the 10 interview questions you should be ready for -- and how to answer them. Continue Reading By- Steve Zurier, ZFeatures
 
- 
                Feature
                27 Jun 2024
                  Will AI replace cybersecurity jobs?Although AI can enhance cybersecurity practices like threat detection and vulnerability management, the technology's limitations ensure a continued need for human security pros. Continue Reading By
- 
                Feature
                26 Jun 2024
                  How to become a cybersecurity architectFrom help desk support personnel to network admin, learn about the multiple paths that can lead to becoming an effective and knowledgeable cybersecurity architect. Continue Reading By- Kyle Johnson, Technology Editor
- Packt Publishing
 
- 
                Tip
                21 May 2024
                  CISSP or CISM: Which should you pursue?For hopeful practitioners, the question of whether to pursue CISSP or CISM depends on their career goals and interests. For some, the question should be, 'Why not both?' Continue Reading By
- 
                Tip
                07 May 2024
                  What is a cloud security engineer, and how do I become one?A cloud security engineer has specific responsibilities for helping to secure cloud infrastructure, applications and IT assets. Continue Reading 
- 
                Definition
                15 Mar 2024
                  Certified Information Security Manager (CISM)Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program. Continue Reading By- Sharon Shea, Executive Editor
 
- 
                Feature
                08 Jan 2024
                  How to become an incident responder: Requirements and moreIncident response is a growth area that provides career advancement options and a good salary. Here's an in-depth look at job requirements, salaries and available certifications. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                Definition
                14 Dec 2023
                  massive open online course (MOOC)A massive open online course (MOOC) is a typically free web-based distance learning program that's designed for large numbers of geographically dispersed students. Continue Reading By- Kinza Yasar, Technical Writer
- Wesley Chai
- Ivy Wigmore
 
- 
                Opinion
                31 Oct 2023
                  How to overcome the beginner cybersecurity career Catch-22The workforce gap constantly makes headlines, but that doesn't mean breaking into the field is easy. Get advice on how to start on an entry-level cybersecurity career path. Continue Reading By- Jon Oltsik, Analyst Emeritus
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
                Feature
                30 Oct 2023
                  What does an IT security manager do?IT security managers need to have a passion for learning and critical thinking skills, as well as understand intrusion prevention and detection. Continue Reading 
- 
                Definition
                06 Oct 2023
                  CSSLP (Certified Secure Software Lifecycle Professional)CSSLP (Certified Secure Software Lifecycle Professional) is a certification from ISC2 that focuses on application security within the software development lifecycle (SDLC). Continue Reading By- Madelyn Bacon, TechTarget
 
- 
                Tip
                29 Sep 2023
                  How to land a corporate board seat as a CISOAny CISO who aspires to a corporate board seat needs a strategic approach. Learn how security executives can position themselves to become top-level decision-makers. Continue Reading By- Jerald Murphy, Nemertes Research
 
- 
                Feature
                18 Jul 2023
                  IT hiring picks up amid ongoing economic concernsTechTarget's 2023 salary and careers survey shows most organizations are hiring for selected IT skills, making progress on DEI initiatives and offering workplace flexibility. Continue Reading By- John Moore, Industry Editor
 
- 
                Definition
                01 Jun 2023
                  NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework)The NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework) is a reference resource that classifies the typical skill requirements and duties of cybersecurity workers. Continue Reading 
- 
                News
                10 May 2023
                  CISOs face mounting pressures, expectations post-pandemicProofpoint's 2023 Voice of the CISO report shows deep concern among executives about impending data loss and exposure from negligent -- and malicious -- employees. Continue Reading By- Alexis Zacharakos, Student Co-op
 
- 
                Definition
                09 May 2023
                  Certified Cloud Security Professional (CCSP)Certified Cloud Security Professional (CCSP) is an International Information System Security Certification Consortium, or (ISC)2, certification that covers cloud-based cybersecurity best practices. Continue Reading By- Casey Clark, TechTarget
 
- 
                Feature
                08 May 2023
                  7 ways to mitigate CISO liability and riskRecent civil and criminal cases have brought CISO liability questions to the fore. Learn how to understand and manage personal risk exposure as a security executive. Continue Reading By- Alissa Irei, Senior Site Editor
 
- 
                Definition
                14 Apr 2023
                  International Information Systems Security Certification Consortium (ISC)2(ISC)2, short for International Information Systems Security Certification Consortium, is a nonprofit organization that provides security training and certificates. Continue Reading By- Madelyn Bacon, TechTarget
 
- 
                Opinion
                11 Apr 2023
                  10 hot topics to look for at RSA Conference 2023RSA Conference 2023 promises another exciting year of cybersecurity discussions and hyperbole. Enterprise Strategy Group's Jon Oltsik shares what he hopes to see at the show. Continue Reading By- Jon Oltsik, Analyst Emeritus
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
                Feature
                11 Apr 2023
                  How to use Azure AD Connect synchronization for hybrid IAMOrganizations face many challenges authenticating and authorizing users in hybrid infrastructures. One way to handle hybrid IAM is with Microsoft Azure AD Connect for synchronization. Continue Reading By- Kyle Johnson, Technology Editor
- Packt Publishing
 
- 
                Feature
                11 Apr 2023
                  Practice Microsoft SC-100 exam questions with answersUse these practice multiple-choice questions, with answers, to assess your knowledge of the Microsoft Cybersecurity Architect exam. Continue Reading By- Kyle Johnson, Technology Editor
- Packt Publishing
 
- 
                Feature
                11 Apr 2023
                  How to prepare for the Microsoft Cybersecurity Architect examBefore taking the Microsoft Cybersecurity Architect exam, learn about the knowledge areas covered on the SC-100 test, studying recommendations, prerequisites and more. Continue Reading By- Kyle Johnson, Technology Editor
 
- 
                Tip
                13 Mar 2023
                  Is cybersecurity recession-proof?No field is totally immune to economic downturns, but flexible, practical and prepared cybersecurity professionals should be able to weather any upcoming storms. Continue Reading By- Jerald Murphy, Nemertes Research
 
- 
                Tip
                30 Jan 2023
                  5 ethical hacker certifications to considerFrom Offensive Security Certified Professional to GIAC Web Application Penetration Tester, learn about the certifications worth earning to begin your ethical hacker career. Continue Reading By
- 
                Tip
                23 Jan 2023
                  8 cybersecurity roles to considerCybersecurity is an exciting and increasingly important field with a wealth of career opportunities. Explore eight cybersecurity roles and the skills, talent and experience required. Continue Reading By- Ashwin Krishnan, StandOutin90Sec
 
- 
                News
                16 Jan 2023
                  Judge dismisses Chris Hadnagy lawsuit against DEF CONDEF CON said it wasn't the only infosec conference to receive code-of-conduct complaints about Chris Hadnagy, claiming Black Hat USA removed him from its review board. Continue Reading By- Rob Wright, Senior News Director, Dark Reading
 
- 
                Definition
                29 Dec 2022
                  Certified Information Systems Security Professional (CISSP)Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)². Continue Reading By- Peter Loshin, Former Senior Technology Editor
- Taina Teravainen
- Ed Tittel
 
- 
                Feature
                13 Dec 2022
                  After the CISO role: Navigating what comes nextFormer chief information security officers may have numerous career options available but no clear path forward. Here's how to navigate life after the CISO role. Continue Reading By- Alissa Irei, Senior Site Editor
 
- 
                Tip
                12 Dec 2022
                  As a new CISO, the first 100 days on the job are criticalAs a chief information security officer, you won't get a second chance to make a first impression. Learn how a CISO's first 100 days lay the foundation for a successful tenure. Continue Reading By- Jerald Murphy, Nemertes Research
 
- 
                Feature
                07 Dec 2022
                  Understanding malware analysis and its challengesDiscover what to expect in a malware analyst career, from the types of malware you'll encounter to important tools to use to difficulties that arise for those new to the field. Continue Reading By- Kyle Johnson, Technology Editor
 
- 
                Feature
                07 Dec 2022
                  Why is malware analysis important?Malware continues to plague all organizations, causing data loss and reputational damage. Discover how malware analysis helps protect companies from such attacks. Continue Reading By- Kyle Johnson, Technology Editor
- Packt Publishing
 
- 
                Tip
                01 Dec 2022
                  Top 5 key ethical hacker skillsEthical hacking can be a rewarding career, but it requires tenacity, curiosity and creativity, among other traits. Oh, and you better be a good writer, too. Continue Reading By
- 
                Feature
                29 Nov 2022
                  How to maintain security with an understaffed security teamUnsurprisingly, many companies function without a complete security team. Security tasks often fall to others in the organization. Here's some advice for stand-in security members. Continue Reading By- Sharon Shea, Executive Editor
 
- 
                Definition
                28 Nov 2022
                  Common Body of Knowledge (CBK)In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional should be familiar with, including skills, techniques and best practices. Continue Reading By- Casey Clark, TechTarget
- Madelyn Bacon, TechTarget
 
- 
                Tip
                16 Nov 2022
                  Reality check: CISO compensation packages run the gamutA capable security executive is invaluable -- a fact organizations increasingly recognize. CISOs' salaries are generally trending up, but the range in compensation is wide. Continue Reading By- Jerald Murphy, Nemertes Research
 
- 
                Answer
                08 Nov 2022
                  3 best professional certifications for CISOs and aspiring CISOsWhile one doesn't necessarily need professional cybersecurity certifications to become a CISO, they don't hurt. Explore the best certifications for CISOs and aspiring CISOs. Continue Reading By- Jerald Murphy, Nemertes Research
 
- 
                News
                01 Nov 2022
                  Cisco Networking Academy offers rookie cybersecurity classesCisco's cybersecurity track equips students for entry-level positions, including cybersecurity technician, junior cybersecurity analyst, and tier 1 help desk support role. Continue Reading By- Mary Reines, News Writer
 
- 
                Tip
                01 Nov 2022
                  Ideal CISO reporting structure is to high-level business leadersCISOs usually report to a high-level executive, but reporting to a top-level business executive like the CEO rather than a technology executive protects the business best. Continue Reading By- John Burke, Nemertes Research
 
- 
                Feature
                28 Oct 2022
                  Advice for beginner computer forensic investigatorsFor those interesting in becoming a computer forensics investigator, learn about the career and what to expect, as well as why digital evidence is the most volatile evidence. Continue Reading By- Kyle Johnson, Technology Editor
 
- 
                Feature
                19 Oct 2022
                  Top 10 pen testing interview questions with answersAre you pursuing a career in pen testing? Prepare with this list of 10 pen testing interview questions and answers created by three security experts. Continue Reading By- Isabella Harford, TechTarget
- Packt Publishing
 
- 
                Feature
                19 Oct 2022
                  Top IT security manager interview questionsAre you looking for a leadership role in cybersecurity? Three security experts offer their advice on how to answer the most common IT security manager interview questions. Continue Reading By- Isabella Harford, TechTarget
 
- 
                Feature
                05 Oct 2022
                  Top zero-trust certifications and training coursesMost organizations are expected to implement zero trust in the next few years. Learn about zero-trust certifications and trainings that can help prepare your security team. Continue Reading By- Katie Donegan, Social Media Manager
- Isabella Harford, TechTarget
 
- 
                Tip
                27 Sep 2022
                  How to get into cybersecurity with no experienceCybersecurity needs new talent now more than ever, but landing that first job without a computer science degree can still be difficult. Here are five tips for getting in the door. Continue Reading By- Ashwin Krishnan, StandOutin90Sec
 
- 
                Guest Post
                26 Sep 2022
                  Tips for developing cybersecurity leadership talentNavigating the skills gap from an employer's perspective starts with investing in talent. Get advice on how to develop and hire emerging leaders from an industry analyst. Continue Reading By- Richard Addiscott
 
- 
                Tip
                13 Sep 2022
                  How to become a CISOThe chief information security officer role is growing in profile and importance. Explore six actionable tips for aspiring CISOs as they work toward cybersecurity's top job. Continue Reading By- Jerald Murphy, Nemertes Research
 
- 
                Quiz
                09 Sep 2022
                  Sample CompTIA CASP+ practice questions with answersPreparing for the CompTIA Advanced Security Practitioner certification or refreshing your knowledge to renew your cert? Use these CASP+ practice questions to test your smarts. Continue Reading By- Isabella Harford, TechTarget
 
- 
                Feature
                09 Sep 2022
                  How to prepare for the CompTIA CASP+ examAre you pursuing the CompTIA Advanced Security Practitioner certification? The author of a CASP+ cert guide offers advice on how to prepare for the exam. Continue Reading By- Isabella Harford, TechTarget
 
- 
                Tip
                07 Sep 2022
                  7 CISO succession planning best practicesNothing is certain except death, taxes and CISO turnover. Learn how to prepare for the inevitable and future-proof your security program with a succession plan. Continue Reading By- Jerald Murphy, Nemertes Research
 
- 
                Tip
                01 Sep 2022
                  Cybersecurity budget breakdown and best practicesOnce budget is secured, CISOs must figure out where it should be allocated -- as well as how to justify the costs. Get the lowdown on a cybersecurity budget breakdown here. Continue Reading By- Ashwin Krishnan, StandOutin90Sec
 
- 
                News
                18 Aug 2022
                  Shunned researcher Hadnagy sues DEF CON over banResearcher Christopher Hadnagy is seeking damages from DEF CON and founder Jeff Moss over their decision to ban him citing multiple claims of conduct violations. Continue Reading By- Shaun Nichols, TechTarget
 
- 
                Guest Post
                26 Jul 2022
                  3 ways to help cybersecurity pros avoid burnoutMany security professionals are pushed to their breaking point. Discover three ways employers and managers can help their employees avoid burnout. Continue Reading By- Chloé Messdaghi
 
- 
                News
                20 Jul 2022
                  DOJ report warns of escalating cybercrime, 'blended' threatsThe Department of Justice's cyber review report warned that the lines between conventional cybercriminal activity and national security threats have all but disappeared. Continue Reading By- Shaun Nichols, TechTarget
 
- 
                Feature
                05 Jul 2022
                  How to write a cybersecurity job postingIs your organization struggling to find cybersecurity talent? Your job descriptions could be the problem. Learn how to write a good cybersecurity job posting. Continue Reading By- Isabella Harford, TechTarget
- Wiley Publishing
 
- 
                Feature
                05 Jul 2022
                  A 'CISO evolution' means connecting business value to securityAs cybersecurity has changed, so has the CISO role. 'The CISO Evolution: Business Knowledge for Cybersecurity Executives' aims to help security leaders succeed in the C-suite. Continue Reading By- Alissa Irei, Senior Site Editor
 
- 
                Feature
                05 Jul 2022
                  How to find your niche in cybersecurityIt's difficult to navigate a career in cybersecurity, especially with all the varying roles. A veteran CISO offers advice on how to find your niche in the security industry. Continue Reading By- Isabella Harford, TechTarget
 
- 
                Tip
                28 Jun 2022
                  Negotiating a golden parachute clause in a CISO contractIf a CISO becomes the company scapegoat after a security incident, a strong golden parachute clause can mean the difference between a soft landing and a hard crash. Continue Reading By- Jerald Murphy, Nemertes Research