Leadership & Careers


  • Image attribution tooltip
    Stefan Zaklin via Getty Images

    US must take a lead role in cyber diplomacy, State Dept. nominee says

    Nathaniel Fick told lawmakers the U.S. should promote international cyber norms to protect national security from authoritarian threats. 

    By Aug. 4, 2022
  • An empty meeting room with a conference table.
    Image attribution tooltip
    Asia-Pacific Images Studio via Getty Images
    Opinion

    Tips for translating cyber risk into board-friendly language

    Just because boards are more aware of the rise in cyberattacks does not mean they understand how digital technology and cybersecurity translate into business risk.

    By Lucia Milică • Aug. 1, 2022
  • Shot of a young businesswoman looking stressed while using a laptop during a late night at work.
    Image attribution tooltip
    Layla Bird via Getty Images

    Relentless vulnerabilities and patches induce cybersecurity burnout

    Cybersecurity professionals are confronting a chronic vulnerability-patch cycle and the situation is getting worse.

    By July 26, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images

    Where 5 programs are investing to close cyber skills gap

    In line with a White House push to close the cyber skills gap, technology firms, nonprofits and other organizations have launched a range of programs to develop a new generation of workers.

    By July 21, 2022
  • Man working at a computer in a dark office with two other people working behind him out of focus.
    Image attribution tooltip
    FG Trade via Getty Images

    As cyber talent demand heats up, hiring managers should shift expectations

    Companies trying to fill cybersecurity roles need to stop looking for unicorns and expand their search to qualified, but often overlooked, job candidates.  

    By Brian Eastwood • July 12, 2022
  • A conference room equipped with laptops in a modern panoramic office.
    Image attribution tooltip
    ismagilov via Getty Images

    Cybersecurity expertise creeps onto Fortune 500 boards

    Companies are trusting technology experts to advise on cybersecurity and regulatory pressures from the board’s perspective.

    By Barbara DeLollis • July 8, 2022
  • None
    Image attribution tooltip
    FangXiaNuo via Getty Images

    CISO priorities for the second half of 2022

    Security executives from Zoom, NS1 and Oomnitza shared their security priorities for the rest of 2022, with a special emphasis on mastering the basics. 

    By Sue Poremba • July 5, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images

    Is your remote IT job candidate legit?

    Organizations are seeing a rise in deepfakes and stolen identities during the job application process, the FBI said.

    By June 29, 2022
  • Image attribution tooltip
    Michael M. Santiago via Getty Images

    New York names first chief cyber officer

    Colin Ahern, the former New York City Cyber Command official, will oversee the state’s Joint Security Operations Center.

    By June 28, 2022
  • Person smiling and holding resume, sitting in front of businessman during meeting or job interview
    Image attribution tooltip
    dragana991 via Getty Images

    Juneteenth beyond a day off: How to celebrate year-round

    Two Black business leaders make the case for diverse hiring as the ultimate celebration of African American slavery’s abolition.

    By Caroline Colvin • June 17, 2022
  • A woman typing.
    Image attribution tooltip
    PeopleImages via Getty Images

    What's holding women back from C-suite roles in tech?

    Leaders like MassMutual CISO Ariel Weintraub stand out in an industry where women hold less than 20% of the top tech jobs. Alongside other technical execs, she's tackling demographic change on a global and company level.

    By Barbara DeLollis • May 23, 2022
  • Shot of a young businesswoman looking stressed while using a laptop during a late night at work.
    Image attribution tooltip
    Layla Bird via Getty Images

    Security professionals are burned out. Here are 5 ways to help them.

    Addressing the causes of burnout requires a top-down approach that better aligns security teams with the rest of the business.

    By Brian Eastwood • April 18, 2022
  • Young businesswoman in casual clothing
    Image attribution tooltip
    eclipse_images via Getty Images
    Opinion

    Now is the time to break gender bias in cybersecurity

    A hidden epidemic that has hindered women’s ability to continue working at pre-pandemic levels is expected to impact infosec.

    By Jinan Budge • April 12, 2022
  • Image attribution tooltip
    Courtesy of Colonial Pipeline Company

    Colonial Pipeline names cybersecurity veteran as first CISO

    The Adam Tice hire comes nine months after a ransomware attack led to a six-day disruption of fuel delivery and a $4.4 million ransom payment.

    By Feb. 23, 2022
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Opinion

    Talk to the board, not just IT, about ransomware

    The spread of fast-moving cyberattacks accelerates the need for rapid, clear communication between end-users, security teams and the board.

    By Lucia Milică • Feb. 4, 2022
  • CIO involvement in security grows as CEOs target risk reduction

    An IDG survey found security improvements are driving IT budget increases. 

    By Samantha Schwartz • Jan. 21, 2022
  • Close up of a large conference table with chairs in a meeting room in the high-rise office building
    Image attribution tooltip
    peterschreiber.media via Getty Images

    C-suite leaders are confident in ransomware protections, despite more attacks

    While it's important for non-IT and security leaders to have buy-in, CISOs have the responsibility to level with their C-suite counterparts on the true threat of ransomware, (ISC)² research shows.

    By Samantha Schwartz • Jan. 5, 2022
  • Single person away from the crowd standing out with dark shadows 3d render render
    Image attribution tooltip
    studio-fi via Getty Images

    How to hire and recruit a CISO

    High turnover means organizations are always on the lookout for new cybersecurity leadership, but what exactly are companies looking for in a CISO? 

    By Sue Poremba • Jan. 4, 2022
  • Image attribution tooltip
    Naomi Eide/Cybersecurity Dive

    RSA Conference postpones event until June citing omicron

    After taking place virtually this year, RSA Conference still plans to hold the event in-person, but the delays will allow a safer gathering, a conference official said.

    By Dec. 23, 2021
  • Image attribution tooltip
    RobertPetrovic via Getty Images

    What threats 4 security professionals are watching over the holidays

    With SOCs down a few people, the time away will test processes and technology. 

    By Samantha Schwartz • Dec. 23, 2021
  • A Black person types on a laptop
    Image attribution tooltip

    Photo by Canva Studio from Pexels

    More research connects security burnout with business risk

    One in three 1Password respondents said burnout adds to a decline in initiative and motivation, which also reduces compliance with security protocols.

    By Samantha Schwartz • Dec. 7, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images

    CISA names 23 industry leaders to advisory board

    The members — who range from industry and government technology and security leaders — will advise CISA Director Jen Easterly on the agency's policies and programs. 

    By Samantha Schwartz • Dec. 2, 2021
  • Shot of a young businessman experiencing stress during late night at work.
    Image attribution tooltip
    PeopleImages via Getty Images

    Security disconnect: Why the CISO role is evolving

    CISOs are too focused on security operations, writing policies or vendor management. Their time is better spent shaping business strategy. 

    By Samantha Schwartz • Nov. 22, 2021
  • Software building
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images

    What to consider when connecting cyber, business strategy

    The common issue security and business leaders run into is miscommunication, Gartner's Jeffrey Wheatman said.

    By Samantha Schwartz • Nov. 17, 2021
  • DHS, homeland security
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by spainter_vfx via Getty Images

    DHS makes cyber hiring more flexible, less certification-based

    The new personnel management system has helped reduce hiring time by 13%, but it's not enough, CISA Director Jen Easterly said. It still takes at least 200 days to hire candidates.

    By Samantha Schwartz • Nov. 16, 2021