Video Bytes: Changing the Script on Cybersecurity Hiring, part 3
In our thrid episode with Matt Donato we look at the candidate experience in the hiring process; where it goes right and where it goes wrong.
Read more...In our thrid episode with Matt Donato we look at the candidate experience in the hiring process; where it goes right and where it goes wrong.
Read more...t two of our video series with Matt Donato, managing director of #cybersecurity hiring company CyberSN, looks at strategies for discovering and communicating the actual personnel need for a company.
Read more...If you want to know which devices in your network are insecure, you need to know your devices, all of them. In our latest Interview, Zac Warren from Tanium argues that visibility is key in achieving good security.
Read more...Finding sufficient human and technology resources to protect company data has reached a crisis point. We explore hiring strategies and tactics with Matt Donato, managing director of CyberSN, in this latest Video Byte
Read more...Our next video byte is up, discussing endpoint protection. That still sounds a lot like “Anti-Virus“ doesn’t it? But endpoint protection has come a long way from „only“ scanning for malicious software.
Read more...There is no lack of lists for the “best” secure messaging apps but we’ve noticed a few things about them: Not all apps on the lists are inherently secure. Hence, here is our list.
Read more...Today is Safer Internet Day and we thought we’d try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is all about.
Read more...With the Data Privacy Day and the data privacy week, the end of January has a particular focus on protecting data. In our special on data privacy, read expert commentary, but also useful knowledge about how your personal data is being used – data collection is not always evil.
Read more...Metropolitan areas in the US have been hit with flash mobs of thieves. Technology already in place could seriously blunt these crimes. The question is whether the shoppers and retailers are ready to take responsibility for using it.
Read more...Last updated on January 28th, 2022 at 09:21 amWhat a year 2021. In terms of (successful) cyber attacks one of the most challenging years ever.
Read more...