skill development

The warning signs of burnout and how to deal with it
It’s easy for information security professionals to feel burnt out. From the constant stream of security alerts to the demands of senior management, it can be tempting …

Cybersecurity is hands-on learning, but everyone must be on the same page
In this interview with Help Net Security, Amanda L. Joyce, Group Leader, Strategic Cybersecurity Analysis & Research, Argonne National Laboratory, offers her unique …

World Health Organization CISO suggests a holistic approach to cybersecurity
Flavio Aggio, CISO at the World Health Organization, has had a challenging year. Since the onset of the COVID-19 pandemic, the WHO has become a significant target for …

Sharing knowledge and moving towards securing all the things!
Originally a software developer (for 17 years), Tanya Janca, CEO of We Hack Purple, switched to security seven years ago. She founded the company to share as much knowledge as …

CyberCops program: ROTC students as future cybersecurity gatekeepers
Not so long ago, a strong password felt mighty enough to keep you safe and your computer data private. But we now live amid heightened risks in malware, phishing, …

NetOps has become fundamental to network management, yet training efforts are lacking
Nearly two-thirds (64%) of network managers, network architects, and network engineers said their organizations have hired dedicated network automation engineers to transition …

Product showcase: ESET Cybersecurity Awareness Training
Engaging training scenarios, plus robust phishing simulation and reporting capabilities ESET is a market-leading cybersecurity provider, offering a comprehensive security …

Addressing the cybersecurity skills gap: Where do we go from here?
There are an estimated 3.12 million cybersecurity jobs that need to be filled – more than double the current number of workers in this field. With this drastic gap, it is …

A more dynamic approach is needed to tackle today’s evolving cybersecurity threats
For decades, the cybersecurity industry has followed a defense-in-depth strategy, which allowed organizations to designate the battlefield against bad actors at their edge …

Paving the way for women in industrial cybersecurity research
The professional journey an individual takes is heavily influenced by the people they are surrounded with throughout their life. From an early age, I knew I wanted to study …

Resilience by design: What security pros need to know about microlearning
It’s no secret that security training is failing us. Research has revealed that more 90% of people struggle to identify a phishing email — arguably one of the most basic …

Technical certifications demand growing, most IT employees have at least one
Technical certifications are increasingly in demand with 87% of IT employees possessing at least one and 40% pursuing their next. According to Questionmark, certification …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?