Articles

  • 1 week ago | reversinglabs.com | Ericka Chickowski

    The state of the cybersecurity job market can seem like a perplexing paradox. On one hand, you’ve got frothy statistics from the likes of ISC2 stating that cybersecurity workforce shortages total 4.8 million positions or more. On the other, you’ve got an ever-growing cadre of newly cyber-certified and -degreed candidates who can’t even seem to get a call back for an interview no matter how many resumes they send out. So what gives?

  • 1 week ago | securityboulevard.com | Ericka Chickowski

    The state of the cybersecurity job market can seem like a perplexing paradox. On one hand, you’ve got frothy statistics from the likes of ISC2 stating that cybersecurity workforce shortages total 4.8 million positions or more. On the other, you’ve got an ever-growing cadre of newly cyber-certified and -degreed candidates who can’t even seem to get a call back for an interview no matter how many resumes they send out. So what gives?

  • 1 month ago | securityboulevard.com | Ericka Chickowski

    One of the biggest problems cybersecurity teams face is the overwhelming uncertainty of situations as cyberattacks unfold. It’s hard to know what mitigations to work on first, which systems are most likely to risk business loss as threat rapidly moves across a network — and how to fix root problems as responders dig into an incident.

  • 1 month ago | securityboulevard.com | Ericka Chickowski

    As technology leadership pushes ever harder to deeply embed AI agents into software development lifecycles — in some cases, even using agentic AI to replace midlevel developers — application security (AppSec) is about to go from complex to a lot more complicated.

  • 2 months ago | reversinglabs.com | Ericka Chickowski

    The U.S. Cybersecurity Infrastructure Security Agency (CISA) recently released new guidance on its Secure by Design principles, outlining best practices that the IT sector should take to reduce the cyber-risks its products are exposing its customers to. Insecure code is being released by software firms, cloud providers, hardware manufacturers, and others, amplifying risk across the entire digital economy.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
3K
Tweets
824
DMs Open
No
Ericka Chickowski
Ericka Chickowski @ErickaChick
17 May 23

RT @Adversa_AI: Europe's Pioneering AI Regulations, AI’s data problem and Strengthening AI Regulation for Safety and Accountability in our…

Ericka Chickowski
Ericka Chickowski @ErickaChick
17 Feb 23

RT @ReversingLabs: @CISAgov is creating a new office to better operationalize cyber supply chain risk management (C-SCRM). @ErickaChick sha…

Ericka Chickowski
Ericka Chickowski @ErickaChick
2 Feb 23

Opsec slip-up tips researchers off to yet another Lazarus Group campaign--this one against healthcare, energy supply chains #cybersecurity #hacking https://t.co/CQvsukhTDs