With the cyber workforce gap looming, security hiring managers are looking in unconventional places and tweaking their job descriptions to appeal to candidates with "soft skills."
Akamai CSO Andy Ellis joins Dennis Fisher to talk about the security implications of moving thousands of employees worldwide to remote work.
Which platform is the riskiest: Windows, Mac, Linux, Unix, or a networking device? Latest research from Kenna Security and Cyentia Institute shows that CISOs have to consider both the number of vulnerabilities and how issues are addressed in order to determine risk.
Thousands of software vulnerabilities are made public each year, leaving IT and security teams to sift out irrelevant issues from the bugs that need to be fixed. Rapid7's Attacker Knowledge Base brings crowd-sourced feedback to enterprise defenders to help them figure out which flaws to pay attention to.
We've put together a list of security and privacy related book recommendations from people across the industry, from technical manuals to histories to cyberpunk fiction.