
Co-authored by Juan Badell and Russell Petrich As two people for whom creating phishing emails constitutes legitimate employment (we are on the product team behind the Sophos Phish Threat phishing simulation service) we know we’re in the minority. Like our not-so-lawful counterparts, we spend our days using social engineering techniques . . . Read more
26 Nov, 2020
behavioral audit, changing security behavior, Cloud Security, corporate cybersecurity, employee security behavior, Hacks, isf, Malware, Mobile Security, Most Recent ThreatLists, password hygiene, security awareness program, Security News, Security practices, training, Vulnerabilities, Web Security
0

Designing a behavioral change program requires an audit of existing security practices and where the sticking points are. Security awareness rarely leads to sustained behavior change on its own, according to a recent analysis – meaning that organizations need to proactively develop a robust “human-centered” security program to reduce the . . . Read more
02 Nov, 2020
Automation, Cloud Security, Cybersecurity Professionals, cybersecurity recruiting, Cybersecurity Skills Gap, How to Minimize the Impact of the Cybersecurity Skills Shortage, machine learning, Malware, managed security services, Mobile Security, Most Recent ThreatLists, recruitment, Security News, skills gap, survey, training, TrustWave, Vulnerabilities, Web Security, workforce shortage
0

Automation, strategic process design and an investment in training are the keys to managing the cybersecurity skills gap, according to a recent survey from Trustwave. More than half of cybersecurity professionals in a recent survey — 57 percent — reported that the cybersecurity skills shortage is either “bad” or “very . . . Read more
11 Aug, 2020
career path, CISO, Cybersecurity Skills Gap, ESG, issa, IT Professional, mentoring, Most Recent ThreatLists, recruiting, Security News, skills development, survey, training
0

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.