How is SLSA compliance meant to be used? Is it something you’re meant to advertise to end users?

I’m putting some effort to attain SLSA level 3 compliance for a closed source, direct to consumer software, and I’m wondering how folk communicate progress to the public.
Is there some sort of auditing process or compliance verification se… Continue reading How is SLSA compliance meant to be used? Is it something you’re meant to advertise to end users?

A closer look at The Ultimate Cybersecurity Careers Guide

In this Help Net Security interview, Kim Crawley, cybersecurity expert and Professor at the Open Institute of Technology, discusses her latest book, The Ultimate Cybersecurity Careers Guide. She shares insights on how aspiring professionals can break i… Continue reading A closer look at The Ultimate Cybersecurity Careers Guide

The U.S. Cyber Trust Mark set to launch

The White House has announced the launch of the U.S. Cyber Trust Mark, a voluntary cybersecurity labeling program for consumer-grade internet-connected devices. “The White House launched this bipartisan effort to educate American consumers and gi… Continue reading The U.S. Cyber Trust Mark set to launch

The U.S. Cyber Trust Mark set to launch

The White House has announced the launch of the U.S. Cyber Trust Mark, a voluntary cybersecurity labeling program for consumer-grade internet-connected devices. “The White House launched this bipartisan effort to educate American consumers and gi… Continue reading The U.S. Cyber Trust Mark set to launch

What’s more important when hiring for cybersecurity roles?

When building a cybersecurity team, you likely asked yourself, “Should I focus on certifications or real-world skills?” And since you rarely encounter entry-level candidates who can hit the ground running, naturally, you’d consider a candidate with bot… Continue reading What’s more important when hiring for cybersecurity roles?

Myths holding women back from cybersecurity careers

In this Help Net Security interview, Dr Kathryn Jones, Head of School, Computer Science and Informatics at Cardiff University, discusses the challenges and misconceptions that deter women from pursuing careers in cybersecurity. Dr Jones also outlines t… Continue reading Myths holding women back from cybersecurity careers

Widening talent pool in cyber with on-demand contractors

Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within existing cyber teams: With fewer team members to spread the workload on, you risk burning out security professionals. Many make t… Continue reading Widening talent pool in cyber with on-demand contractors