SN blogs: Expert shares ways to overcome cybersecurity skills shortage

SN blogs: Experts discuss solutions to security skills shortages, bandwidth consumption patterns and preparing for VoIP.

What CISOs can do to overcome the cybersecurity skills shortage

Enterprise Strategy Group Senior Principal Analyst Jon Oltsik tells CISOs what they can do to overcome the cybersecurity skills shortage. Oltsik cites ESG research that says 25% of organizations surveyed reporting a "problematic shortage of security skills." He explains that this problem comes from both a lack of security professionals and a lack of skills. When asked about their biggest challenges around incident detection and response, 39% of respondents said lack of staff, while 28% pointed to lack of analytics skills. To overcome this problem, Oltsik recommends outsourcing as one of four potential solutions.

Read about the four solutions Oltsik gives to overcome the cybersecurity skills shortage.

How to prepare your network for VoIP

Enterprise Management Associates blogger and networking expert Jim Frey offers advice on how to prepare your network for voice over IP (VoIP) implementation. A lot of the problems that organizations face with VoIP, such as dropped calls and poor call quality, can be prevented by taking a network readiness assessment. The first step Frey says to take is to establish visibility and take inventory. Take a look at which applications are used the most on your network and where network congestion might block up voice quality. In addition, determine if you already have IP-based video or voice traffic on your network.

Read the other steps Frey suggests you take before you roll out a VoIP implementation.

Two mobile threat reports disagree

Paula Musich, senior analyst at Current Analysis, discusses two mobile threat reports released by Sophos and F-Secure that highlight Android-targeted mobile malware attacks. While Android devices are particularly vulnerable to malware attacks, iOS devices are not impenetrable. Musich cites F-Secure research that says seven Android vulnerabilities were made public in 2013, while 90 were made public for iOS. The two reports disagree on how many vulnerabilities exist between the two operating systems, but Musich asserts that it is important for everyone who uses a smart device to avoid giving out too much personal information and to make sure to use strong passwords and encryption.

Read Musich's full explanation of the reports.

Which cloud-based apps demand more bandwidth?

Current Analysis Research Director Brian Washburn says that when it comes to projecting bandwidth consumption, existing applications, not next-stage cloud applications, will be demand drivers. Internet traffic is no longer doubling or tripling in volume, he writes. But it will continue to climb, with one vendor, Cisco, anticipating a 23% annual growth rate in the years to come. A new generation of cloud-based applications, such as those supporting network functions, virtualization and other services, will contribute to that growth -- but not as much as traditional applications will, such as Web surfing and video streaming. Washburn's advice: When projecting bandwidth consumption patterns, bet on the apps you're using already as the ones generating the most demand.

Read what Washburn says about various types of applications and how they affect the bandwidth consumption.

This was first published in March 2014

Dig deeper on Network Security Best Practices and Products

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Related Discussions

Sonia Groff asks:

What applications have you found take up the most bandwidth?

0  Responses So Far

Join the Discussion

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close