New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Information security certifications, training and jobs News
March 09, 2018
News roundup: Our Security Advocates emerges amid criticism of RSA Conference's lack of female keynote speakers. Plus, a kill switch is discovered for the Memcrashed DDoS exploit, and more.
July 12, 2017
Jules Okafor discusses the skills gap in the cybersecurity industry, how better IT diversity could help, and what is needed to bring in more women and minorities.
July 07, 2017
A new survey shows a majority of organizations are facing a cybersecurity skills gap and experts say more focus on women and minorities could be key to finding talent.
May 02, 2017
The NATO Locked Shields cyberwar games had the U.S. team winning most improved, but experts say the U.S. still needs more practice.
Information security certifications, training and jobs Get Started
Bring yourself up to speed with our introductory content
Software development training with an emphasis on secure coding can improve enterprise security postures. Steve Lipner of SafeCode discusses different ways to get the job done. Continue Reading
If you're studying for the CISSP exam, don't miss this special Security School on Domain 8. Review important concepts in software development security and sharpen your skills. Continue Reading
Understanding the ins and outs of the software development lifecycle is pivotal to passing Domain 8 of the CISSP exam. Are you ready? Find out with this practice quiz. Continue Reading
Evaluate Information security certifications, training and jobs Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This information security certification guide looks at vendor-neutral certifications in specialized areas such as risk management, security auditing and secure programming. Continue Reading
This information security certificate guide looks at vendor-neutral computer forensics certifications for IT professionals interested in cyber attribution and investigations. Continue Reading
Part three of this information security certification guide looks at vendor-neutral advanced security certifications for more experienced IT professionals. Continue Reading
Manage Information security certifications, training and jobs
Learn to apply best practices and optimize your operations.
Stealth is an attacker's best friend, especially when it comes to sneaking malware past the firewall. Learn about some trusty tools that can stop malware in its tracks. Continue Reading
It takes a variety of tactics, including network segmenting and monitoring, to safeguard the network. Learn the latest defenses to keep your network safe. Continue Reading
Cohen is a globally recognized expert in information protection and cybersecurity. Since coining the term 'computer virus,' he has remained a pioneer in information assurance. Continue Reading
Problem Solve Information security certifications, training and jobs Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
SearchSecurity talks with David Shearer, CEO of (ISC)2, about what is -- and isn't -- contributing to the cybersecurity skills shortage in the U.S., as well as how to fix the problem. Continue Reading
This series looks at the top information security certifications for IT professionals. Part one reviews basic, vendor-neutral certifications for entry-level positions. Continue Reading
Outmoded stereotypes, not enough female execs -- there are many reasons for the low numbers of women in cybersecurity. Most (but not all) are easily fixed. Continue Reading