Remove Architecture Remove CISO Remove Network Security
article thumbnail

On the Cybersecurity Jobs Shortage

Schneier on Security

The numbers never made sense to me, and Ben Rothke has dug in and explained the reality : …there is not a shortage of security generalists, middle managers, and people who claim to be competent CISOs. They are not looking for someone interested in security.

article thumbnail

Top 9 Trends In Cybersecurity Careers for 2025

eSecurity Planet

Knowledge of cloud systems architecture and how it interacts with various devices is invaluable. Blockchain: Developed primarily for cryptocurrency applications and maligned for manipulating those markets, blockchain can be a valuable security tool, as its universe of connected nodes is almost impossible to corrupt or destroy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

I had the chance to discuss this with Shinichi Yokohama, NTT Global CISO and John Petrie, Counselor to the NTT Global CISO, at RSA Conference 2023. We discussed how the boundaries between in-company and out-of-company IT infrastructure have become increasingly blurred making network security more challenging than ever.

CISO 244
article thumbnail

The Security Startup Ecosystem and the Trends Cisco is Watching

Cisco Security

Today, the Cisco Investments team released their 2021 CISO Survival Guide to Emerging Trends in the Startup Ecosystem. Written in partnership with three leading VCs, this report breaks down trends in four areas of the security startup arena: Secure Access Service Edge (SASE), DevSecOps, Privacy & Compliance, and Automation.

CISO 145
article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

Trying to maintain computational and algorithmic advantage, we want to make sure that not only are we being secure by design, but we want to make sure that the whole ecosystem is properly addressed. That includes the architectures, the computing platforms, the algorithms and the people and the process as well. And that’s been overcome.

CISO 109
article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. By increasing visibility into DNS traffic, CISOs can detect, block, and respond to incidents more quickly as well as use this data to institute new controls and increase overall resiliency.

DNS 140
article thumbnail

How to drive a successful, proactive tech refresh

Cisco Security

And one can safely assume that very few CISOs are so flush with team members that they are hunting for something for them to do! Figure 1: Effect of IT architecture traits on tech refresh performance. For a more effective refresh strategy, organizations should adopt a modern, consolidated, cloud-based architecture.