George V. Hulme

The rising security risk of the citizen developer

What makes a good application pen test? Metrics

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

The 10 essential Reddits for security pros

The 10 essential Reddits for security pros

Here, we’ve gathered 10 of the best cybersecurity Reddits so you don’t have to waste any time and can get straight to what you are looking for.

7 (more) security TED Talks you can’t miss

7 (more) security TED Talks you can’t miss

In this selection you’ll find speakers taking on some of the most pressing, and persistent, security and privacy challenges of our time, from how society can fight the war on terror while maintaining the social values we cherish to...

Tackling cybersecurity threat information sharing challenges

Tackling cybersecurity threat information sharing challenges

What are the lessons learned and recommended practices for forming new information sharing organizations? That’s where the newly formed International Association of Certified ISAOs (IACI) comes in. IACI CEO Michael Echols explains.

Enterprises continue to struggle to find cybersecurity talent, survey finds

Enterprises continue to struggle to find cybersecurity talent, survey finds

More enterprises continue to turn to managed security services providers to close the gap

Business transformation proves to be a catalyst for cybersecurity spending

Business transformation proves to be a catalyst for cybersecurity spending

Evolving risks and business technologies shift focus in security budgets

9 biases killing your security program

9 biases killing your security program

Here’s a (by no means all-inclusive) list of nine such cognitive biases that security professionals should especially remain aware.

7 strategies to avoid CSO burnout

7 strategies to avoid CSO burnout

After a while the pressures take their toll, and many security professionals burnout, or choose to change careers before that happens. To help you avoid that fate, we’ve assembled seven strategies every CISO should consider.

So you want to be a security researcher?

So you want to be a security researcher?

Ever consider conducting your own security research but didn’t know where to start? DataGravity CISO Andrew Hay has some advice for you.

10 security Ted Talks you can’t miss

10 security Ted Talks you can’t miss

A slideshow of 10 interesting TED talks

CSO Threat Intelligence Survival Guide

If enterprises want to understand how they can better invest in security defenses, build the necessary processes to respond to attacks, and mitigate the risks of a breach they need to get threat intelligence right.

Load More