Blogs focused on cyber security, data intelligence, and analytics for the hiring economy
Addressing the Cyber Security Gender Gap
One of the most persistent characteristics of the booming cyber security industry has been the continued gender gap. Women are on average underrepresented and earn lower salaries than men. Addressing the gender gap can be one of the most powerful trump cards in...
The Evolution of Investments in Cyber Security
The threats from hacking and data theft have been evolving at a rapid rate in recent years. Cyber attacks in the shape of DDOS attacks, ransomware and phishing scams have caused massive disruptions in the life of businesses and individuals alike. Bank accounts,...
The Top 4 Cyber Security Jobs of 2018
The cyber security field is one of the fastest growing, dynamic and lucrative job markets in terms of job availability and compensation. For professionals with the skills, experience and preparation to break into this competitive space, handsome rewards and higher...
Working Remotely in IT and Cyber Security
With an eye on decreasing operational costs and improving the quality of life of their employees, companies have been increasingly considering the possibility of allowing their staff to work remotely, either at home or in independent workspaces. A 2017 Gallup poll of...
Tips for Finding and Hiring Top Cyber Security Talent
Over 60 percent of companies in the United States have been on the receiving end of cyber attacks and the hacking threat has been on the rise as technology improves. With this worrying trend, safeguarding data has become one of the most important issues for companies...
The Impact of Regulations on the Cyber Security Job Market
It’s a widespread belief that regulations are a barrier to job growth. This idea came to prominence in the late 1970’s and early 80’s with the Chicago School of “Supply Side Economics” and was thrown onto the national stage during Ronald Reagan’s first presidential...
Transitioning from IT to Cyber Security
As one of the fastest growing and most dynamic segments of the world economy, information technology has been attracting a wide range of talented professionals. Despite growing demand for qualified pros, working in IT comes with certain requirements and prerequisites...
Evaluating Candidate Aptitudes for IT and Cyber Security Positions
For employers in the IT and cyber security realms, one of the toughest challenges has been adequately filling an increasing number of job openings. While it’s difficult to find candidates with qualifications that match requirements, many employers are realizing that...
Blockchain Technology and Cyber Security: What You Need to Know
The recent boom in cryptocurrency trading has brought the world’s attention to the blockchain, the driving force behind the Bitcoin phenomenon, and many companies and governments are starting to take notice. Though this technology is best known for authenticating...
Responding to Recent Increases in Large-Scale DDoS Attacks
Distributed Denial of Service, otherwise known as DDoS, attacks have become more prominent lately in today’s news. What exactly is a DDoS attack? This particular cyber crime involves blasting targeted servers with traffic and information requests until websites...
Addressing the Cyber Security Gender Gap
One of the most persistent characteristics of the booming cyber security industry has been the continued gender gap. Women are on average underrepresented and earn lower salaries than men. Addressing the gender gap can be one of the most powerful trump cards in...
The Evolution of Investments in Cyber Security
The threats from hacking and data theft have been evolving at a rapid rate in recent years. Cyber attacks in the shape of DDOS attacks, ransomware and phishing scams have caused massive disruptions in the life of businesses and individuals alike. Bank accounts,...
The Top 4 Cyber Security Jobs of 2018
The cyber security field is one of the fastest growing, dynamic and lucrative job markets in terms of job availability and compensation. For professionals with the skills, experience and preparation to break into this competitive space, handsome rewards and higher...
Working Remotely in IT and Cyber Security
With an eye on decreasing operational costs and improving the quality of life of their employees, companies have been increasingly considering the possibility of allowing their staff to work remotely, either at home or in independent workspaces. A 2017 Gallup poll of...
Tips for Finding and Hiring Top Cyber Security Talent
Over 60 percent of companies in the United States have been on the receiving end of cyber attacks and the hacking threat has been on the rise as technology improves. With this worrying trend, safeguarding data has become one of the most important issues for companies...
The Impact of Regulations on the Cyber Security Job Market
It’s a widespread belief that regulations are a barrier to job growth. This idea came to prominence in the late 1970’s and early 80’s with the Chicago School of “Supply Side Economics” and was thrown onto the national stage during Ronald Reagan’s first presidential...
Transitioning from IT to Cyber Security
As one of the fastest growing and most dynamic segments of the world economy, information technology has been attracting a wide range of talented professionals. Despite growing demand for qualified pros, working in IT comes with certain requirements and prerequisites...
Evaluating Candidate Aptitudes for IT and Cyber Security Positions
For employers in the IT and cyber security realms, one of the toughest challenges has been adequately filling an increasing number of job openings. While it’s difficult to find candidates with qualifications that match requirements, many employers are realizing that...
Blockchain Technology and Cyber Security: What You Need to Know
The recent boom in cryptocurrency trading has brought the world’s attention to the blockchain, the driving force behind the Bitcoin phenomenon, and many companies and governments are starting to take notice. Though this technology is best known for authenticating...
Responding to Recent Increases in Large-Scale DDoS Attacks
Distributed Denial of Service, otherwise known as DDoS, attacks have become more prominent lately in today’s news. What exactly is a DDoS attack? This particular cyber crime involves blasting targeted servers with traffic and information requests until websites...