Information Security Leader, Author, Instructor and Speaker

Default utility Image

Cybersecurity training for employees: The why and how TAGS: | Cybersecurity training programs play a crucial role in keeping employees informed about the changing threat landscape and about their personal …Continue reading →

Default utility Image

5 essential programming languages for cybersecurity pros TAGS: | | Coding is an essential skill across almost every technological discipline today, and cybersecurity is no exception. Cybersecurity professionals must understand …Continue reading →

Default utility Image

How to shift from DevOps to DevSecOps TAGS: | | | The worlds of software development and IT have changed tremendously over the last two decades. Software development evolved from the …Continue reading →

Default utility Image

Navigate the DOD’s Cybersecurity Maturity Model Certification TAGS: | | In January, the U.S. Department of Defense released the Cybersecurity Maturity Model Certification requirements, outlining new cybersecurity stipulations for DOD …Continue reading →

Default utility Image

The 5 Cybersecurity Must-Haves for Every Business TAGS: | Walking the exhibition hall at a modern cybersecurity trade show can be a dizzying experience. Vendors from every angle tout …Continue reading →

Default utility Image

Plugging the cybersecurity skills gap with security automation TAGS: | | The cybersecurity profession is in a state of crisis: There simply aren’t enough workers to go around. CyberSeek published a …Continue reading →