Most security training providers have basic analytics for performance and attendance, and they call it data. But how do they…
read moreN2K research shows that some security leaders believe enterprise cybersecurity training is time-consuming, not always relevant to the company’s needs,…
read moreThe number of enterprise cybersecurity training providers and format options can be overwhelming to choose from. Many providers offer certification…
read moreN2K has been honored with two Global Infosec Awards Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine.…
read moreCybersecurity professionals are on the cutting edge of new cyber attack tactics, techniques, and procedures. After all, the landscape changes…
read moreWhat is Vulnerability Assessment and Management? The common misconception is it’s only about vulnerability scanning and penetration tests. Vulnerability assessment…
read moreSome training methods may be costing you more than you realize.
read moreWritten by Simone Petrella The Aspen Institute’s September 2021 report addresses diversity, equity, and inclusion in the field of cybersecurity.…
read moreWritten by George Monsalvatge and Joshua Hester As more and more organizations are integrating cloud services within their infrastructure, ensuring…
read moreWritten by Simone Petrella The cybersecurity workforce finally got a seat at the table…but it still needs a voice. Last…
read more