With the pace of global change so often creating a sense of accelerating chaos, it's easy to view cyber defenders as firefighters constantly on call. But Black Hat conference founder and creator Jeff Moss warned that "things have been on fire for as long as I can remember."
The pace of change including the rise of artificial intelligence and a sense of accelerating chaos can make cybersecurity professionals feel like "things are kind of everything, everywhere, all at once," said Black Hat conference founder Jeff Moss. How should they respond?
Chuck Markarian’s career began with testing airplane components at Boeing. With a background in math and physical sciences, he leveraged his technical expertise and curiosity to transition into IT and eventually into security leadership. In this interview, he shares his journey and advice for others.
Open-source intelligence, commonly referred to as OSINT, is the collection, analysis and use of publicly available information from open sources. These sources include websites, social media, news articles, public records, forums and even multimedia content such as videos and photos.
Cybersecurity jobs typically pay well and they can be personally rewarding because they merge advanced technical challenges with a vital mission - protecting critical systems, data and people. In this post, we'll focus on the highest-paying jobs and the challenges and opportunities they offer.
They have been CISOs and privacy officers who headed cybersecurity initiatives at some of the top tech companies in the world. How do Edna Conway, Michelle Dennedy and Wendy Nather feel about AI BOMs, privacy initiatives and the threat landscape emerging in 2025? They open up in this exclusive panel.
Jerry Cochran's career began as a radar electronics technician, where he built a foundation in technology before transitioning to IT and ultimately cybersecurity. His journey across the military, public and private sectors required him to adapt to different leadership environments.
Cybersecurity expert and Georgetown University lecturer Chuck Brooks explores the profound impact of emerging technologies on privacy and security in his book, "Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security."
If you're a cybersecurity professional trying to come up with ideas for your holiday wish list (or maybe you’re a loved one trying to pick out the perfect gift), look no further! Here are some top picks that will thrill any cybersecurity practitioner.
David Ortiz was building websites over 20 years ago when he first become exposed to cybersecurity. Back then, his biggest worry was denial-of-service attacks. Today, as a CISO of a global company, emerging AI threats related to phishing and deepfakes are what keeps him up at night.
Cybercriminals are launching relentless attacks. The potential for breaches and exploitation has increased as the world has become more connected, raising an urgent question: Are we winning the fight against cybercriminals, or are we just sinking deeper into their grasp?
The torrents of public hostility directed at health insurers in the aftermath of UnitedHealthCare CEO Brian Thompson's murder are serious signs of intensifying cyber and physical threats facing the C-suites of healthcare and many other sectors, said Chris Pierson, founder and CEO of BlackCloak.
Organizations ranging from multinational corporations to government agencies and international nonprofits require cybersecurity expertise. These roles often include exciting opportunities for travel or relocation, making them an attractive path for professionals ready to take their careers global.
As former director of information security and privacy at Sonesta Hotels, Michael Woodson championed a proactive approach to cybersecurity. His leadership philosophy underscores the importance of cultural transformation and continuous learning in building robust security programs.
The role of CISOs is evolving beyond a technical leadership position to a more strategic one. As cybersecurity threats grow in complexity, CISOs must work closely with business leaders to align security strategies with overall business objectives, said Erika Dean, CSO at Robinhood Markets.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.