Hiring the hidden gems: Should InfoSec hire from other industries?

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Dec 02, 2016
Featured Image

Who's on your IT security dream team?

There are a number of important roles to fill, and I'm not just talking about job titles: I mean attitudes, and abilities that verge on superpowers. IT security is a team sport, so who do you want on your team? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Hiring the hidden gems: Should InfoSec hire from other industries?
Wisconsin recount over suspected hacking may not be entirely by hand
Study warns of human rights risks from censoring online terror content
2017 security predictions
Report: Most cybercriminals earn $1,000 to $3,000 a month
SIEMs-as-a-service addresses needs of small, midsize enterprises
Bad (internet of) things
Senators fail to stop new rules allowing US law-enforcement hacking

White Paper: J2 Global Communications

HIPAA, Cyber Hacking and ePHI Security

Analysis of the Department of Health and Human Services data suggests that in 2016, the healthcare industry has suffered four data breaches per week so far, while the private research firm IDC has estimated that one in three healthcare patients can expect to have their medical records and other ePHI breached by cybercriminals in 2016. Read More

Thumbnail Image
INSIDER

Hiring the hidden gems: Should InfoSec hire from other industries?

The information security industry is in desperate need of skilled personnel. But, as CSO investigates, some of those professionals could potentially be sourced from other industries. Read More

Thumbnail Image

Wisconsin recount over suspected hacking may not be entirely by hand

A judge in Wisconsin has refused to order a recount by hand of ballots cast in the state for the U.S. presidential elections, shooting down a petition by Green Party candidate Jill Stein that the use of automatic tabulating equipment, identified as potential targets of foreign government agents, “risks tainting the recount process.” Read More

Thumbnail Image

Study warns of human rights risks from censoring online terror content

Internet companies should not be required to monitor third-party terrorist content that they host or transmit, nor should they face direct or indirect liability from governments for such content, according to a new study. Read More

Thumbnail Image

2017 security predictions

If you thought 2016 was bad, fasten your seat belts -- next year is going to be even worse. Read More

Thumbnail Image

Report: Most cybercriminals earn $1,000 to $3,000 a month

Most cybercriminals make between $1,000 and $3,000 a month, but 20 percent earn $20,000 a month or more, according to a recent report from Recorded Future Read More

Thumbnail Image

SIEMs-as-a-service addresses needs of small, midsize enterprises

Traditional security information and event management systems are expensive, require dedicated security staff, and are difficult to set up and manage -- but managed security service providers are stepping in to make SIEMs practical for smaller firms Read More

Thumbnail Image

Bad (internet of) things

What we can do to keep all those clever devices from causing harm. Read More

Thumbnail Image

Senators fail to stop new rules allowing US law-enforcement hacking

Three senators' efforts to stop a major expansion of U.S. law enforcement agencies' hacking powers has failed for now. Read More

White Paper: Absolute

IDC Technology Spotlight, "Modern 'Embedded' Endpoint Security: Gain Visibility into and Control of Data, Devices, and Appliances Regardless of Location and Connectivity

Enterprise IT teams face an uphill struggle to maintain visibility into and control over corporate resources and mitigate risks to critical business assets. This Technology Spotlight explains why a modern endpoint security strategy requires an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Read More

8 tips for managing without authority

When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success.

How to reduce Windows 10's on-disk footprint

Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that.

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.