Notice: Trying to access array offset on value of type bool in /www/wp-content/themes/Divi/includes/builder/functions.php on line 2807 Notice: Trying to access array offset on value of type int in /www/wp-content/themes/Divi/includes/builder/ab-testing.php on line 1353 Notice: Trying to access array offset on value of type int in /www/wp-content/themes/Divi/includes/builder/ab-testing.php on line 1353 Blog | HuntSource.io

Blogs focused on cyber security, data intelligence, and analytics for the hiring economy

Addressing the Cyber Security Gender Gap

Addressing the Cyber Security Gender Gap

One of the most persistent characteristics of the booming cyber security industry has been the continued gender gap. Women are on average underrepresented and earn lower salaries than men. Addressing the gender gap can be one of the most powerful trump cards in...

read more
The Evolution of Investments in Cyber Security

The Evolution of Investments in Cyber Security

The threats from hacking and data theft have been evolving at a rapid rate in recent years. Cyber attacks in the shape of DDOS attacks, ransomware and phishing scams have caused massive disruptions in the life of businesses and individuals alike. Bank accounts,...

read more
The Top 4 Cyber Security Jobs of 2018

The Top 4 Cyber Security Jobs of 2018

The cyber security field is one of the fastest growing, dynamic and lucrative job markets in terms of job availability and compensation. For professionals with the skills, experience and preparation to break into this competitive space, handsome rewards and higher...

read more
Working Remotely in IT and Cyber Security

Working Remotely in IT and Cyber Security

With an eye on decreasing operational costs and improving the quality of life of their employees, companies have been increasingly considering the possibility of allowing their staff to work remotely, either at home or in independent workspaces. A 2017 Gallup poll of...

read more
Transitioning from IT to Cyber Security

Transitioning from IT to Cyber Security

As one of the fastest growing and most dynamic segments of the world economy, information technology has been attracting a wide range of talented professionals. Despite growing demand for qualified pros, working in IT comes with certain requirements and prerequisites...

read more
Addressing the Cyber Security Gender Gap

Addressing the Cyber Security Gender Gap

One of the most persistent characteristics of the booming cyber security industry has been the continued gender gap. Women are on average underrepresented and earn lower salaries than men. Addressing the gender gap can be one of the most powerful trump cards in...

read more
The Evolution of Investments in Cyber Security

The Evolution of Investments in Cyber Security

The threats from hacking and data theft have been evolving at a rapid rate in recent years. Cyber attacks in the shape of DDOS attacks, ransomware and phishing scams have caused massive disruptions in the life of businesses and individuals alike. Bank accounts,...

read more
The Top 4 Cyber Security Jobs of 2018

The Top 4 Cyber Security Jobs of 2018

The cyber security field is one of the fastest growing, dynamic and lucrative job markets in terms of job availability and compensation. For professionals with the skills, experience and preparation to break into this competitive space, handsome rewards and higher...

read more
Working Remotely in IT and Cyber Security

Working Remotely in IT and Cyber Security

With an eye on decreasing operational costs and improving the quality of life of their employees, companies have been increasingly considering the possibility of allowing their staff to work remotely, either at home or in independent workspaces. A 2017 Gallup poll of...

read more
Transitioning from IT to Cyber Security

Transitioning from IT to Cyber Security

As one of the fastest growing and most dynamic segments of the world economy, information technology has been attracting a wide range of talented professionals. Despite growing demand for qualified pros, working in IT comes with certain requirements and prerequisites...

read more