How Cybersecurity Found Me: My Career Journey
Ben Holladay shares his career journey from consulting into cybersecurity sales and advice for building your career through finding mentors, building skills, and staying true to your values.
Ben Holladay shares his career journey from consulting into cybersecurity sales and advice for building your career through finding mentors, building skills, and staying true to your values.
The talent shortage in the cybersecurity industry is a persistent challenge. In celebration of #IWD2021, let’s take a look at the impact women can make by helping to alleviate the talent shortage simply by choosing to challenge their comfort zone.
“Lifting Each Other Up: A Celebration of Women in Cybersecurity and Their Advocates” is our latest eBook, containing inspiring stories of inclusion and support in cybersecurity.
“Lifting Each Other Up: A Celebration of Women in Cybersecurity and Their Advocates” is our latest eBook, containing inspiring stories of inclusion and support in cybersecurity.
Cybersecurity is a team sport. When a community rises, we all rise. We are honored to support programs that ensure the next generation rises with cybersecurity expertise.
Cybersecurity Manager, Alex Della Serra shares how her team came together in 2020 to respond in unprecedented times .
In 2020, not only was there no shortage of damaging, heavily publicized security breaches, more people were forced to do more over the internet than ever before – expanding the attack surface. Cybercriminals tactics are always changing and growing in sophistication, promising the threat landscape in 2021 will bring all new challenges.
Cisco SecureX has made our great partner relationships even better. Cisco Secure partner NWN is an outstanding example. Check out our last blog in our 3-part series to learn what NWN is doing to deliver outstanding results with SecureX.
IT-OT collaboration is mandatory for securing industrial networks. But what’s in it for both teams? How can they build this partnership? What does converged IT/OT security operations actually mean?
CONNECT WITH US