• Although some organizations have splintered cybersecurity from IT for structural purposes, typically IT teams shoulder the responsibility for security. This means IT professionals are the people who enforce the policies and run the tools to protect their organizations’ data. But even though IT teams are the de facto security team in most places, do they have all the access to tools and technology they need? Not necessarily, according to recently completed (ISC)² research. The research suggests most organizations do not provide adequate resources for training and development, or enough people, to run security. Even worse, (ISC)²’s 2017 Global Information Security Workforce Study (GISWS) reveals the ability to defend against cyber attacks has declined over the past year. These are unsettling findings

    Sep 21,
  • For years, many in the United States have viewed the traditional four year degree as the only path to a successful career. In late July, a new bill was introduced on the Hill that recognizes the need to change that mindset -- the New Collar Jobs Act. What exactly is a “new collar” job? According to IBM, the original advocate for building new collar career skills, new collar jobs are “roles in some of the technology industry’s fastest growing fields — from cybersecurity to digital design — that require technical training or some postsecondary education but not necessarily a four-year degree.” With the projected workforce shortage of 1.8 million by the year 2020, it is encouraging to see a growing

    Sep 14,
  • (ISC)² webcasts are a great source for insight into all areas of security. From the Internet of Things to malware and compliance, the topics vary. Here are the top 10 (ISC)² webcasts for 2017 so far as ranked by cybersecurity professionals:   Part 1: Future of SIEM - Why Static Correlation Fails Insider Threat Detection Hackers stealing credentials and operating in your corporate network…disgruntled employees collecting customer lists and design materials for a competitor...malware sending identity information back to random domains…these common threats have been with us for years and are only getting worse. Most organizations have invested large amounts in security intelligence, yet these solutions have fallen short. Simply put, security intelligence and management, in the form of legacy

    Aug 31,
  • Name: Adam BoultonTitle: Senior Vice President, Security TechnologyEmployer: BlackBerryLocation: United KingdomDegree: Bachelor of Science (Honors) in Software EngineeringYears in IT: 12Years in cybersecurity: 12Cybersecurity certifications: CCSP, CISSP, CSSLP, CSTM, QSTM, OCJA   How did you decide upon a career in cybersecurity? I’ve been really interested in technology for as long as I can remember. I was fortunate enough to know that since my early teens I wanted my career to be in software engineering. I am sure my story is very similar to many others, technology really captured my imagination from early on. I remember learning Assembly and QBasic, that is where it started for me. Then I started to learn about reverse engineering around the age of 16 and

    Aug 29,
  • Name: Mark A. SingerTitle: Principal Software EngineerEmployer: DoD Sub-ContractorLocation: Indianapolis, INEducation: Business ManagementYears in IT: 19Years in cybersecurity: 12Cybersecurity certifications: CISSP   How did you decide upon a career in cybersecurity? Evolution. I stumbled into computers when I served in the U.S. Navy from 1985 to 1989 when PCs with 8086 processors were common. When I got out of the service, I was able to get a job working for Naval Avionics in Indianapolis and was placed in a role where I was doing local computer support on tempest computers (386, 486, & 486DX processors). When Naval Avionics was identified on the Base Closure list, I accepted a position in the Security Department as ISSM in 1997 with Hughes which

    Aug 23,