How to Win the IT Advisory Talent Battle

How to Win the IT Advisory Talent Battle

Demand never has been higher for the IT advisory skill set. At our firm, we’re seeing more competition now than even existed in the SOX boom of the mid-2000s. Positions across the United States are re-maining open for months at a time. Your company wants to make sure it’s not settling on the first ap-plicant [...]

Build Your (ISC)² Network through Chapters in EMEA and North America

Build Your (ISC)² Network through Chapters in EMEA and North America

Are you looking to start an (ISC)² Chapter in your area? The enrollment period for chapters in the Europe, Middle East and Africa (EMEA) and North America regions is now open through February 5. Through the chapter program, (ISC)² members and other information security professionals further advance the organization’s vision to inspire a safe and [...]

Exploit Kits: Protect Yourself Before You Wreck Yourself

Exploit Kits: Protect Yourself Before You Wreck Yourself

Exploit kits have become go-to tools for attackers to take control of victims’ machines or steal information. To protect yourself from this type of attack, it’s important to understand how exploit kits work, what their process is, and what vulnerable parts of your organization they are targeting. Our brief, Exploit Kits: A Series of Unfortunate [...]

Is Your Security Team Ready For Cloud?

Is Your Security Team Ready For Cloud?

A version of the following article originally appeared in Dark Reading. By now, most of us in IT are well aware of the technical and business advantages that moving to a cloud-based data center provides. But there is still a lingering hesitancy among some organizations considering a move to the cloud. In my experience, most [...]