Blog

Blog Categories

I asked cybersecurity experts to name the hackers who have had the biggest impact, good or bad, across the years. This is the result. Defining a hacker is almost guaranteed to kick off the kind of impassioned debate you might ordinarily associate with sports team rivalry. For this article, however, I deliberately backed away from the hacker or cracker debate. Instead, I opted to take the broadest possible meaning within the context of the...
Advent International and Crosspoint Capital Partners have agreed to acquire Forescout Technologies (Nasdaq: FSCT) for $33 per share in cash, or approximately $1.9B, in a deal that will take the cybersecurity software provider private. Michael DeCesare will remain as Forescout's president and CEO after the deal closes, the  company said Thursday . The agreement allows the San Jose, Calif.-based device security firm to solicit...
What does it take to crack the code of cybersecurity when it comes to best practices? A 2019  Fortinet  survey asked chief information security officers (CISOs) to comment on how the expanding complexity of cybersecurity impacts their ability to fulfill their responsibilities. CISOs said there is an increased need for learning and development for security team members. Other concerns included risk management and cybersecurity...
Cybersecurity needs unconventional hires to help lead the next phase of development and innovation, coupled with salaries that aren't insulting  Think of the hottest high-tech regions and two words likely come to mind: Silicon Valley. There’s no question that the area stretching from San Francisco to San Jose continues to be the undisputed world leader when it comes to technology innovation and development, and of course, tech...
The Pentagon has finalized the long anticipated cybersecurity standards contractors will have to follow before winning contracts from the Department of Defense, a new process called the Cybersecurity Maturity Model Certification (CMMC) 1.0. The model is a tiered cybersecurity framework that grades companies on a scale of one to five based on the level of classification and security that necessary for the work they are performing....
Turns out, skill beats experience and an academic degree doesn't guarantee higher compensation for five security positions. In the rapidly growing cybersecurity industry, some positions don't offer a clear-cut path to a higher salary. An academic degree and years of experience, considered a promising combination in traditional industries, don't guarantee security employees a bigger paycheck. Cynet researchers polled 1,324 security...
You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how. Cybersecurity professionals are trained to secure, fix, and prevent security breaches and cyberattacks. To become a cybersecurity professional, you need to have your head in the game. But more than that, you also need to be an excellent resume tactician because it takes impeccable industry-relevant experience...
Cybersecurity continues to be one of the fastest-growing fields. Thousands of job postings go unfilled. If you're eager to transition from your current job to a career in cybersecurity, this is the course for you. Learn how to leverage the skills and experience you already have—whether your background's in IT, security, or another tech field—to build a lucrative and successful new career. Find out how to identify the right...
You landed an interview for a job in one of the most exciting, fast-growing fields in technology: cybersecurity. In this course, learn what to do before, during, and after your interview to significantly increase your chances of landing the cybersecurity position you're vying for. Instructor Tu Laniyonu highlights the three types of interview formats you'll likely encounter; shares common questions you should expect to answer (and ask); and...
The Department of Interior awarded CenturyLink a contract potentially worth $1.6 billion for network security and IT modernization. Under the contract, a task order award under the GSA’s Enterprise Infrastructure Solutions program, CenturyLink will provide Interior with managed core network services and managed access services. The contract has a base period of one year, a CenturyLink spokesperson said. According to the news release,...
The U.S. government needs to do more to protect itself in cyberspace as adversaries’ technological capabilities rise, according to the departing general counsel of the NSA. Glenn Gerstell, who is leaving the NSA later this year, said the expanding threat landscape — caused by the combination of nation-state’s capabilities and the onset of technologies such as 5G, artificial intelligence and the internet of things —...
Accenture Security is to acquire Symantec's Cyber Security Services business from Broadcom. No financial terms were disclosed regarding the acquisition, which is expected to close in March 2020, subject to customary conditions.   The impending  Symantec   deal  is the latest in a long line of acquisitions by  Accenture  Security in the threat intelligence and cybersecurity fields. Already in...