Cybersecurity Supply Hasn’t Caught Up with Demand – A Decade of IT Trends, Part IV

Unlike cloud computing, the concept of cybersecurity didn’t burst onto the IT scene in the past 10 years. Securing data has always been of the utmost importance. From our inaugural survey to this year’s 10th annual IT Skills and Salary Report, cybersecurity has remained one of the principal IT focal points. Since 2011, security has ranked either first or second in terms of top tech interest by our survey respondents. While cybersecurity has always been a priority, managing it has changed drastically in the last decade. IT security professionals have different responsibilities than they did in 2008.

Read more

A Beginner’s Guide to Encryption

It should come as no surprise that in this modern era of digital data we need encryption. But what exactly is it? How do you know what kind of encryption you need? If you were to ask someone what kind of encryption they use, they may respond with a specific encryption-based product, like full-disk encryption. Or they may mention an encryption-based protocol, like HTTPS (HyperText Transport Protocol over SSL). But encryption is much more complicated than that.

Read more

Top 10 Steps to Building a Better Password

While most folks not in the depths of your IT department have little involvement keeping your organization’s data under wraps, there are some best practices that even the least tech savvy among us can deploy. Apparently keystroke encryption, anti-malware products, and patch management are the keys to keeping big data safe these days. But a strong password is a great start, too.

Read more

A Brief Look Into the Investment Economics of Cybersecurity

There has been a lot of discussion among chief information security officers (CISOs) about the “right number” to invest in cybersecurity. It’s a hot button topic with few signs of waning. Unfortunately, there is no hard and fast rule for this type of investment due to various factors. If only it were as simple as a percentage, dollar amount or range. Let’s take a closer look at why it’s hard to find a “magic number” for cybersecurity investment.

Read more