SHARE
Facebook X Pinterest WhatsApp

For Security Pros, Time to Head Back to School

Written By
thumbnail
Pat Burke
Pat Burke
Aug 19, 2016

While many industries and fields require continued, mandated education, the discipline of cyber-security isn’t one of them. For security professionals, it doesn’t take long for a skills gap to widen. Cyber-criminals—and their tactics—continuously evolve, but all too often the same defenses are kept in play. By the time a threat is detected, it’s too late: employees have unwittingly given up information or company funds, customer data has been swiped or confidential (and compromising) information has been leaked.

IT security breaches are all too often a matter of if, not when, but there are ways to minimize the risk your organization faces. One way is to keep current with the latest trends in cyber-crime and learn how to recognize a threat early on.

Customers, partners and employees of SecureAuth, which focuses on adaptive access control, now have a means to fortify their cyber-defense skills. SecureAuth University is a continuing education program that combines e-learning and instructor-led courses. SecureAuth University offers certification for three levels of cyber-security professionals: administrator, advanced administrator and developer.

Back to School for Security Pros

“While there are many industries that provide, and in fact mandate continuing education–namely the legal and financial sectors–such programs are severely lacking within the cyber-security field,” said Rohit Khanna, senior vice president of Customer Success at SecureAuth.

“With the rapid evolution of attack tactics, the cyber-security industry must hold itself to a higher standard. By earning a certification through SecureAuth University, security professionals can demonstrate their skills and expertise not only within the SecureAuth ecosystem, but also within the cyber-security industry at large.”

According to SecureAuth, the school provides:

*A greater understanding of current methods used in cyber-attacks, and how to recognize the early stages of a breach.

*Education on layering adaptive authentication methods such as, device recognition, analysis of the physical location of the user, or continuous authentication such as behavioral biometrics to verify the identity of the user.

*The value in threat services to determine remote access request risks.

*How to increase cyber-security while maintaining frictionless user experience, enabling activity; and how flexible workflows can be used to tailor security levels for different use cases.

“There is clearly a disconnect for many C-level executives who don’t ‘get’ cyber-security,” Khanna said. 

Recommended for you...

Ransomware Attacks: The Endless Horror Movie
Drew Robb
Dec 30, 2021
What Businesses Must Learn About Data Integrity From the IMF Controversy
Dan Adams
Dec 21, 2021
Succeeding in a Crowded MSP Marketplace
Drew Robb
Oct 11, 2021
Don’t Overlook IT Risk Compliance When Defending Against Cyberattacks
Richard Chambers
Sep 22, 2021
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.