Information Security Careers, Training and Certifications News
February 10, 2016
Obama ups spending by 35% in the 2017 cyber budget, adds a federal CISO and pushes multifactor authentication, but still faces stiff Republican opposition in Congress.
November 19, 2015
TechTarget 2015 Annual Salary and Careers Survey: Out of the myriad of security responsibilities for an enterprise, IT risk management and regulatory compliance occupy the most time.
October 02, 2015
News roundup: Despite a low adoption rate going into the liability shift, many in the industry are optimistic about the future of EMV use. Plus: TrueCrypt flaws; AWS crypto keys stolen; women in infosec.
August 27, 2015
An up-to-date application security program -- as well as knowing how to connect with stakeholders -- is critical to being a successful CISO today, said Renee Guttmann, vice president, Office of the CISO at Accuvant Inc.
Information Security Careers, Training and Certifications Get Started
Bring yourself up to speed with our introductory content
Spotlight article: Shon Harris explains the core concepts in the CISSP domain on software development security, including models, methods, database systems and security threats. Continue Reading
Spotlight article: Shon Harris explains the main concepts in the CISSP domain on telecommunications and networking, including network protocols, extension technologies and more. Continue Reading
CISO training programs, like the Deloitte CISO Transition Lab, are available for those who are new to the role. Expert Mike O. Villegas explains what's covered in these programs. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Information Security Careers, Training and Certifications Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Following ISACA's recent acquisition of the CMMI Institute, expert Judith Myerson takes a closer look at COBIT and CMMI models and how they compare to one another. Continue Reading
Getting younger generations interested in cybersecurity careers isn't that hard, but it does require the industry to put effort into education. And enterprises should lead the way. Continue Reading
It's tough to tell what the best IoT certifications are since the field is new and expanding. Expert Mike O. Villegas shares the best IoT security certificates available today. Continue Reading
Manage Information Security Careers, Training and Certifications
Learn to apply best practices and optimize your operations.
The lack of cybersecurity skills in the industry is glaring, but there are ways for educators, vendors and enterprises to fix the problem. Sean Martin explains how. Continue Reading
As the need for a dedicated information security officer catches fire beyond firewalls, how should companies engineer the expanding CISO role? Continue Reading
An unusual game of musical chairs is unfolding as companies scramble to ensure information security and shore up their ranks to the tune of regulators. Continue Reading
Problem Solve Information Security Careers, Training and Certifications Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When candidates prepare for a CISO job interview, they should know the answer to 12 specific questions. Expert Mike O. Villegas reviews the questions. Continue Reading
The problem-solving skills that many enterprises need to counter threats are hard to identity, let alone multiply. Continue Reading
Hiring privacy professionals for your enterprise can be a daunting task. Expert Mike O. Villegas explains the role and what qualities to look for in candidates. Continue Reading