Tag: ISC

Top Total Security Conferences of 2021: In-Person Events

As a security and public safety professional, it is important to keep your ear to the pulse of the industry, grow, and learn new skills and best practices. Attending the industry’s top total security conferences can help you do just that. Don’t know where to start? Don’t fret! We’ve done the research for you, so […]

International

Supply Chain Threats Pose Unique Risks, Demand Unique Solutions

As a security professional, you understand the complexity of defending your organization (or client’s organization) against any number of existing and potential threats. The exercise becomes Malthusian, however, when you’re forced to account for the security practices of every vendor in your organization’s supply chain. While basic strategies like regular anti-malware scans and limiting network […]

Young woman at a job interview.

Can Technology Help Close Your Organization’s Cybersecurity Talent Gap?

The current job market is hot, and with unemployment at a low, many employers are struggling to attract top talent. While most industries are struggling to recruit the best people, those who are looking for qualified cybersecurity personnel might need to dig deep into their reservoir of patience. Hiring managers tasked with posting cybersecurity jobs […]

Cybersecurity Education Concept

Are You Committed to the Future of Cybersecurity?

It’s not really news to CISOs looking to hire cybersecurity talent that there are simply not enough qualified applicants for open positions. Postings for cybersecurity jobs tend to linger for months, and recent studies show that the gap between the demand for cybersecurity talent and the actual supply is only going to grow. Estimates from […]

Hackers coding virus using laptops.

Peering Into the Cybersecurity Crystal Ball

As 2018 creeps to a close, its time for thought leaders of all stripes to start prognosticating about what the cybersecurity landscape will be in the coming year. It’s a tall order, as this past year brought some complete surprises, including speculative execution vulnerabilities, the rise of cryptomining, the ransomware attack on the city of […]