article thumbnail

On the Cybersecurity Jobs Shortage

Schneier on Security

The numbers never made sense to me, and Ben Rothke has dug in and explained the reality : …there is not a shortage of security generalists, middle managers, and people who claim to be competent CISOs. They are not looking for someone interested in security.

article thumbnail

BSides Leeds 2023 – Kim Hendry – The NSM Ouroboros: Embracing The Endless Cycle Of Network Security Monitoring

Security Boulevard

Thanks are in order to BSides Leeds for publishing their presenter’s outstanding BSides Leeds 2023 security content on the organizations’ YouTube channel. Permalink The post BSides Leeds 2023 – Kim Hendry – The NSM Ouroboros: Embracing The Endless Cycle Of Network Security Monitoring appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

Trying to maintain computational and algorithmic advantage, we want to make sure that not only are we being secure by design, but we want to make sure that the whole ecosystem is properly addressed. That includes the architectures, the computing platforms, the algorithms and the people and the process as well. And that’s been overcome.

CISO 109
article thumbnail

The Security Startup Ecosystem and the Trends Cisco is Watching

Cisco Security

Today, the Cisco Investments team released their 2021 CISO Survival Guide to Emerging Trends in the Startup Ecosystem. Written in partnership with three leading VCs, this report breaks down trends in four areas of the security startup arena: Secure Access Service Edge (SASE), DevSecOps, Privacy & Compliance, and Automation.

CISO 112
article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. By increasing visibility into DNS traffic, CISOs can detect, block, and respond to incidents more quickly as well as use this data to institute new controls and increase overall resiliency.

DNS 140
article thumbnail

How to drive a successful, proactive tech refresh

Cisco Security

And one can safely assume that very few CISOs are so flush with team members that they are hunting for something for them to do! Figure 1: Effect of IT architecture traits on tech refresh performance. For a more effective refresh strategy, organizations should adopt a modern, consolidated, cloud-based architecture.

article thumbnail

Is Your Security Stack and Legacy Tech Keeping Pace With Your Business?

CyberSecurity Insiders

By Tyler Farrar, CISO, Exabeam. More investment is also being directed at enhancing the security stack with ‘cloud first’ strategies instead of traditional on-premises spend. It makes sense that security budgets should follow to help protect these increasingly diverse and flexible architectures. Leaving The Legacy.