One in three cybersecurity job openings go begging, survey finds
"The main problem of obtaining key talent in the realm of cyber security stems from a lack of qualified applicants."
"The main problem of obtaining key talent in the realm of cyber security stems from a lack of qualified applicants."
Why we're building digital enterprises and networks on a rickety foundation, and what needs to be done about it.
Brought to you by Cisco
New EY report warns that with IoT, 'finding loopholes to enter any network will be easier for any attacker since there will be so many ways to attack.'
Within IoT, 'security has to live at the level of the API, to stay fully within the control of devices' manufacturers and vendors.'
Sneaky, sneaky: Organizations suffer 55 employee-related incidents of fraud each year — mainly through employees getting hold of privileged users' credentials.
High-profile security attacks are like shark attacks: they get a lot of press, but do not represent the greatest threats to enterprise security.
Eighty percent of the security incidents studied by Trustwave were due to the use of weak administrative credentials.
Number one password in use in 2011? 'Password'!
Leading tech companies have long used 'ethical hackers' to help probe vulnerabilities in their systems and software. Should some of the not-so-ethical hackers be added to payrolls as well?
The CSA Security, Trust & Assurance Registry (STAR) is intended to encourage transparency of security practices within cloud providers.