Most Recent Blogs

The Truth About Cybersecurity Certifications

Posted: October 12, 2016   /   By: Jon Oltsik   /   Tags: Cybersecurity, CISSP, cybersecurity certification, ISSA

certification.jpgIt’s a common trait among cybersecurity professionals: When they meet each other, discuss their qualifications with prospective employers, or print their business cards, there is often an alphabet soup of initials by their names, specifying the many certifications they’ve achieved.

Read More

The Enterprise Security Model Is Experiencing “Death by a Thousand Cuts”

Posted: August 15, 2013   /   By: Jon Oltsik   /   Tags: Network Security, Cybersecurity, Information and Risk Management, Security and Privacy, Security, endpoint security, enterprise security, compliance, CISO, mssp, security operations, security services, CISSP, identity management

If enterprise security were an automobile it would be a Ford Taurus circa 1995. Good car way back when and still running but burning oil, barely passing inspection, and held together by bondo today.

Read More

Biggest Information Security Management Challenges for Enterprise Organizations

Posted: August 17, 2012   /   By: Jon Oltsik   /   Tags: IBM, Microsoft, Information and Risk Management, HP, McAfee, Enterprise Software, Oracle, Security and Privacy, risk management, sap, SIEM, SANS, ISC2, RSA Security, Security Management, security operations, CISSP, Tibco

In the recently-published ESG Research Report, Security Management and Operations: Changes on the Horizon, ESG surveyed 315 security professionals working at North America-based enterprise organizations (i.e., more than 1,000 employees).

Read More

Information Security Skills Shortage Continues

Posted: January 19, 2012   /   By: Jon Oltsik   /   Tags: Information Security, Cybersecurity, Information and Risk Management, Security and Privacy, federal government, ISC2, NIST, security services, CISSP, security skills, cloud security

Like other analyst firms, ESG conducts research on IT Spending Intentions annually. The latest 2012 report will be published soon, but in the meantime, I've taken a look at the data that will be included. One of the things we track is IT hiring plans in all areas including IT security.

Read More

Posts by Topic

see all