{"id":5820,"date":"2015-08-05T22:03:01","date_gmt":"2015-08-06T14:03:01","guid":{"rendered":"http:\/\/vspherestorage.com\/?p=5820"},"modified":"2015-08-05T22:03:03","modified_gmt":"2015-08-06T06:03:03","slug":"cybersecurity-skills-shortage-demands-new-3","status":"publish","type":"post","link":"https:\/\/vspherestorage.com\/?p=5820","title":{"rendered":"Cybersecurity skills shortage demands new&#8230;"},"content":{"rendered":"<p>Cybersecurity skills shortage demands new workforce strategies<\/p>\n<p><a href='http:\/\/vmw.re\/1KS62JI' target='_blank'><img src='https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/528e7793-1a74-4586-90c1-6ff233693b88\/?size=Box320'><\/a><\/p>\n<h4><a href='http:\/\/vmw.re\/1KS62JI' style='text-decoration: none;' target='_blank'>Cybersecurity skills shortage demands new&#8230;<\/a><\/h4>\n<p>The race to find InfoSec professionals with cybersecurity skills who can keep up with advanced threats has companies worldwide facing hurdles.<\/p>\n<hr \/>\n<p><a href='http:\/\/advocacy.vmware.com' target='_blank'>VMware Advocacy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity skills shortage demands new workforce strategies Cybersecurity skills shortage demands new&#8230; The race to find InfoSec professionals with cybersecurity skills who can keep up with advanced threats has companies worldwide facing hurdles. VMware Advocacy<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-5820","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4m26N-1vS","jetpack-related-posts":[{"id":14471,"url":"https:\/\/vspherestorage.com\/?p=14471","url_meta":{"origin":5820,"position":0},"title":"The Security Toolbox: 8 In-Demand Cybersecurity&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"The Security Toolbox: 8 In-Demand Cybersecurity JobsThe Security Toolbox: 8 In-Demand Cybersecurity...This blog is part of a series to help organizations of any size optimize their security. Our experts provide insights and recommendations based on common security use cases, customer questions, and security software developer needs. If you\u2019re a technical\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":14475,"url":"https:\/\/vspherestorage.com\/?p=14475","url_meta":{"origin":5820,"position":1},"title":"The Security Toolbox: 8 In-Demand Cybersecurity&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"The Security Toolbox: 8 In-Demand Cybersecurity JobsThe Security Toolbox: 8 In-Demand Cybersecurity...This blog is part of a series to help organizations of any size optimize their security. Our experts provide insights and recommendations based on common security use cases, customer questions, and security software developer needs. If you\u2019re a technical\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":14479,"url":"https:\/\/vspherestorage.com\/?p=14479","url_meta":{"origin":5820,"position":2},"title":"The Security Toolbox: 8 In-Demand Cybersecurity&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"The Security Toolbox: 8 In-Demand Cybersecurity JobsThe Security Toolbox: 8 In-Demand Cybersecurity...This blog is part of a series to help organizations of any size optimize their security. Our experts provide insights and recommendations based on common security use cases, customer questions, and security software developer needs. If you\u2019re a technical\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":210,"url":"https:\/\/vspherestorage.com\/?p=210","url_meta":{"origin":5820,"position":3},"title":"U.S. and Japan to Cooperate on Cybersecurity,&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"\"cyberspace has a growing role in ensuring national security\"U.S. and Japan to Cooperate on Cybersecurity,...The United States and Japan have agreed to share resources, information and expertise in response to growing cyber attacks.VMware Advocacy","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2201,"url":"https:\/\/vspherestorage.com\/?p=2201","url_meta":{"origin":5820,"position":4},"title":"New tactics for improving critical&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"MIT consortium develop new tactics for improving critical #cybersecurity infrastructureNew tactics for improving critical...The MIT Sloan School of Management has launched (IC)3, a consortium that takes an interdisciplinary research approach to improving critical infrastructure cybersecurity.VMware Advocacy","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9491,"url":"https:\/\/vspherestorage.com\/?p=9491","url_meta":{"origin":5820,"position":5},"title":"CloudLock and CDW Form Strategic Alliance With&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"CloudLock and CDW Form Strategic Alliance With Cloud Cybersecurity and CASB SolutionsCloudLock and CDW Form Strategic Alliance With...CloudLock , the leading provider of Cloud Access Security Brokerage (CASB) and Cybersecurity-as-a-Service solutions, today announced it signed a... Read more at VMblog.com.VMware Advocacy","rel":"","context":"In &quot;VMware Advocacy&quot;","block_context":{"text":"VMware Advocacy","link":"https:\/\/vspherestorage.com\/?cat=12"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts\/5820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5820"}],"version-history":[{"count":1,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts\/5820\/revisions"}],"predecessor-version":[{"id":5821,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts\/5820\/revisions\/5821"}],"wp:attachment":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}