Do You Have What It Takes to Become a CISO?

Although the title of chief information security officer—or “CISO”—has only been around since the mid-90s, CISOs have quickly become indispensable to many organizations across a wide range of industries (Morgan, 2020). Have you ever wondered how CISOs approach cybersecurity and management? What challenges do they face, and what skills do they need to develop to […]
EC-Council University: The Right Choice for a Master’s Degree in Cybersecurity

A master’s degree in cybersecurity can open up a wide range of career opportunities and is well worth the investment. Although cybersecurity skills are in high demand, there aren’t enough qualified applicants to fill all open positions: In a recent survey of cybersecurity professionals, nearly 40% of respondents reported that job openings at their organization […]
The Biggest Data Breaches of the 21st Century

While major technological advances have had widespread positive effects for individuals and organizations, they’ve also increased vulnerability to data breaches: incidents in which information is stolen or accessed by hackers without the system owner’s permission. Cyberattacks resulting in the exposure of data have become increasingly common over the last two decades. The annual number of […]
Can Cyberattacks Lead to Offline Warfare?

April 2007 marked the first large-scale cyberattack on a nation when Estonia was hit by a series of hacks—allegedly sponsored by the Kremlin—that shut down the government, financial, and other websites and services across the country (Pamment et al., 2019). It took a month for the Estonian government and NATO cybersecurity experts to restore normal […]
What Can You Do with an Online Degree in Cybersecurity?

Today, most enterprises have an online presence, making them more susceptible to cyberattacks. According to former FBI Director Robert Mueller, “There are only two types of companies: those that have been hacked and those that will be” (French, 2018, p. 607). Enterprises have much to gain from implementing industry-best cybersecurity practices. As one of today’s […]