How To Write a Good Cybersecurity Resume

A lot of cybersecurity jobs await out there for the qualified job seeker. According to Cyberseek, the United States had 464,200 cybersecurity job openings as of July 30, 2021. And with the skills gap, there are even more openings every day. But that doesn’t mean you’re guaranteed a job offer. So, how do you make […]

The post How To Write a Good Cybersecurity Resume appeared first on Security Intelligence.

Continue reading How To Write a Good Cybersecurity Resume

Cybersecurity Training: How to Build a Company Culture of Cyber Awareness

When I attended new employee orientation at a global technology company several decades ago, I remember very brief cybersecurity training. The gist was to contact someone in IT if we noticed any potential issues. While I was with the company, I only thought about cybersecurity when I passed the server room, and I could only peek […]

The post Cybersecurity Training: How to Build a Company Culture of Cyber Awareness appeared first on Security Intelligence.

Continue reading Cybersecurity Training: How to Build a Company Culture of Cyber Awareness

5 Ways to Use Microlearning to Educate Your Employees About Cybersecurity

Trying to learn large amounts of information in one sitting is often overwhelming and leads to lower retention. Psychologist Hermann Ebbinghaus found in studying himself in the 1800s that only 20% of information learned is retained four weeks later. However, his retention increased from 80% to 90% when using microlearning. That means he took in […]

The post 5 Ways to Use Microlearning to Educate Your Employees About Cybersecurity appeared first on Security Intelligence.

Continue reading 5 Ways to Use Microlearning to Educate Your Employees About Cybersecurity

Where Digital Meets Human: Letting HR Lead Cybersecurity Training

One of my favorite questions to ask when I’m interviewing a business decision-maker is if they are confident in their company’s current defenses. Most people tell me yes. So, I was surprised to read that an IDG Research Services survey commissioned by Insight Enterprises found that 78% of respondents reported that they do not think […]

The post Where Digital Meets Human: Letting HR Lead Cybersecurity Training appeared first on Security Intelligence.

Continue reading Where Digital Meets Human: Letting HR Lead Cybersecurity Training

Young People Are the Key to Decreasing the Skills Gap

It’s time to look at the industry skills gap differently. More and more digital native young people could potentially be coming into the industry with the right skills, but several elements block their progress. Professionals already in place need to smooth the road for them. That might involve changing some assumptions about hiring, but in […]

The post Young People Are the Key to Decreasing the Skills Gap appeared first on Security Intelligence.

Continue reading Young People Are the Key to Decreasing the Skills Gap

The Art and Strategy of Becoming More Cyber Resilient

In the military, the art of strategy is key. It teaches how to win a war through a series of battles, campaigns and tactics. In the cybersecurity world, we have been on the defensive side for as long as we can remember. We focus on frameworks and tactics such as Defense in Depth, the onion […]

The post The Art and Strategy of Becoming More Cyber Resilient appeared first on Security Intelligence.

Continue reading The Art and Strategy of Becoming More Cyber Resilient

School Cybersecurity: How Awareness Training Removes Attackers’ Options

Keeping student data safe and maintaining information security in education are part of living in today’s world for educators. Why is it important to include data security in their work? Find an example of how to set up a school cybersecurity policy and more below. School Cyberattacks On the Rise There’s no sign that digital […]

The post School Cybersecurity: How Awareness Training Removes Attackers’ Options appeared first on Security Intelligence.

Continue reading School Cybersecurity: How Awareness Training Removes Attackers’ Options

The New Wave of Cybersecurity Awareness Training

The only constant is change. The ongoing effects of COVID-19 have taught us that change is inevitable to survive. One major area that has been affected during COVID-19 is how we interact with employees, and what we need those employees to know right n… Continue reading The New Wave of Cybersecurity Awareness Training

A More Effective Approach to Combating Software Supply Chain Attacks

Software supply chain attacks are not new, although, as we have seen recently, if executed successfully, they can have huge payoffs for sophisticated attackers. Detecting malicious code inserted into a trusted vendor’s security updates is difficult to do at scale. For most organizations, it is impractical given the time required to analyze updates versus the […]

The post A More Effective Approach to Combating Software Supply Chain Attacks appeared first on Security Intelligence.

Continue reading A More Effective Approach to Combating Software Supply Chain Attacks

5 Cybersecurity Best Practices For Planning Ahead

Putting best practices in place is the most efficient way to combat cybersecurity threats. But that’s easier said than done, as there are a lot of forces working against our best efforts. The talent shortage looms the largest; there simply aren’t enough qualified cybersecurity experts out there to provide organizations a strong foundation. Without a […]

The post 5 Cybersecurity Best Practices For Planning Ahead appeared first on Security Intelligence.

Continue reading 5 Cybersecurity Best Practices For Planning Ahead