David Weldon

Author Archives: David Weldon

The 20 highest-paying markets for cyber security engineers

Big spendersImage by UnsplashIT security professionals are in high demand in most job markets, but some metropolitan areas are better than others when it comes to offering a top pay check. Randstat recently released its annual IT salary study, which looked at the top 45 highest paying markets in 27 states. Following are the top 20 markets for cyber security engineers, based on the medium salary reported.To read this article in full or to leave a comment, please click here

What IT security pros are earning in 2017

Continued high demand following a record year of breachesImage by ThinkstockLast year was a record one for data breaches, with some 1,093 breaches reported. That represented a 40 percent increase over the prior year, according to the Identity Theft Resource Center. It is no wonder that information security remains one of the most top-of-mind issues for CIOs, CISOs, and CEOs. The result is continued high demand for IT security pros. “The market for IT security professionals is poised for another strong year,” notes CompTIA Senior Vice President Tim Herbert. “The security job category was one of the faster growing IT occupations during 2016. During the last 90 days, U.S. employers posted nearly 25,000 job openings for security positions.”To read this article in full or to leave a comment, please click here(Insider Story)

A deeper look at business impact of a cyberattack

Few would dispute that cyberattacks are increasing in frequency and in intensity, and most organizations confirm they have now suffered at least one cyber incident. But do those organizations have a true sense of the full impact on the organization? After all, the direct costs commonly associated with a data breach are far less significant than the “hidden costs” incurred.Indeed, the “hidden” costs can amount to 90 percent of the total business impact on an organization, and will most likely be experienced two years or more after the event. These are among the findings of a recent study by Deloitte Advisory entitled, “Beneath the Surface of a Cyberattack: A Deeper Look at the Business Impacts.”To read this article in full or to leave a comment, please click here

A deeper look at business impact of a cyberattack

Few would dispute that cyberattacks are increasing in frequency and in intensity, and most organizations confirm they have now suffered at least one cyber incident. But do those organizations have a true sense of the full impact on the organization? After all, the direct costs commonly associated with a data breach are far less significant than the “hidden costs” incurred.Indeed, the “hidden” costs can amount to 90 percent of the total business impact on an organization, and will most likely be experienced two years or more after the event. These are among the findings of a recent study by Deloitte Advisory entitled, “Beneath the Surface of a Cyberattack: A Deeper Look at the Business Impacts.”To read this article in full or to leave a comment, please click here

5 things that top CSO candidates need on a resume

If all the recent IT hiring surveys are to be believed, chief security officers can expect a pretty sweet year in 2016. Job demand is up. Salaries are way up. And neither trend is expected to slow anytime soon.Yes, good CSOs can pretty much write their own ticket in 2016. That is, if they can write a good resume.Despite the growing demand for IT security leaders, IT recruiters confirm that organizations are still very fussy about whom they will bring on board or promote into this key role. A strong background in technology and IT security is a given. But so are business savvy, solid communication skills, top leadership qualities, and demonstrated value.To read this article in full or to leave a comment, please click here(Insider Story)

Are your biggest security threats on the inside?

The now infamous Ashley Madison website has had a pretty successful run at helping its clientele be disloyal. So perhaps some would view it as poetic justice if the website became one of the most scandalous breaches in history at the hands of one of its own. At least that is the conclusion of IT security analyst John McAfee, who noted recently “yes, it is true. Ashley Madison was not hacked – the data was stolen by a woman operating on her own who worked for Avid Life Media.” If true, the fact that the Ashley Madison breach was due to an internal, and not external, threat shouldn’t come as too big a surprise. Many IT security studies this year have pointed to the growing threat of insider data theft and corporate breaches. To read this article in full or to leave a comment, please click here