Editor's Choice


The cybersecurity skills gap needs time and investment to address

28 February 2023 Editor's Choice

Across the IT industry there is a significant skills gap, which is even more significant when it comes to the cybersecurity subsection. However, as data becomes increasingly valuable and an increasingly more attractive target for cybercriminals, and data protection regulations more stringent, this is one area that needs to be addressed as a matter of priority. This will require both time and investment, and there is no quick fix.

One of the reasons for this skills gap is that cybersecurity is a highly specialised field, which means that it requires a significant level of skill and experience across multiple areas to reach proficiency. Cybersecurity touches not only data but also hardware, networking, operating systems, applications and more, and requires an in-depth understanding and the ability to script and code.

There is also no linear path to becoming a specialist in cybersecurity, but it is a highly technical and complex career path that requires solid foundations in all areas of IT, and certifications across many of these areas. The field is also constantly evolving, which requires a mindset of continuous learning.

Cybersecurity is also an area where theoretical knowledge can get a person only so far. The true value comes from experience, which is difficult to obtain in the real world. There is a conundrum where we need cybersecurity professionals, and we need them to have skills and experience, but allowing them to learn and make the mistakes necessary to get this experience could be detrimental.

The challenge for many cybersecurity professionals is that it takes time to pass knowledge on, and letting people learn under supervision takes longer than simply solving the problem. Organisations that specialise in cybersecurity need to find creative ways of helping to build out skills and experience to address this widening gap. This also needs to involve a significant mentorship component to allow people to gain the experience they need in a safer environment.

When it comes to accessing cybersecurity skills, it is often more beneficial to outsource this service, rather than trying to maintain it in-house. Not only are skilled cybersecurity professionals scarce (which also means expensive) they are also difficult to retain and they tend to specialise in certain areas rather than generally across the very wide field.

Outsourcing cybersecurity generally results in a better security posture, because you can access a broad pool of skills and specialists across many areas. In addition, these outsourced partners are in a better position to be the mentors and teachers needed to help address the skills gap, which will eventually contribute to a growing pool of skills.

In cybersecurity, the major focus needs to be on growing the skills pool. For businesses, an outsource provider can deliver enhanced security and reduce risk. For those looking to enter this field, working with a cybersecurity outsource provider can help with access to learning and mentorship needed to enter this dynamic, complex and highly technical field.




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Designing with PCIe
Spectrum Concepts Editor's Choice Interconnection
PCI Express has become the backbone of modern high-performance systems with each new generation promising higher bandwidth, but that performance comes with a cost.

Read more...
Understanding two key tools for cleaner serial data
Altron Arrow Editor's Choice Analogue, Mixed Signal, LSI
Understanding how pre-emphasis and equalisation works, and when to use one over the other, is critical when designing reliable high-speed systems.

Read more...
Connected without limits: An engineering perspective on Altron Arrow’s wireless ecosystem
Altron Arrow Editor's Choice Design Automation
Wireless connectivity is no longer a supporting technology, but rather, a core design consideration that underpins modern electronic systems across industries.

Read more...
Telemetry powering South Africa’s industry
Interlynx-SA Editor's Choice
As South Africa’s economy evolves, industries are under increasing pressure to improve operational efficiency and cut costs. Telemetry is becoming a vital component of industrial strategy, allowing companies to harness real-time data to optimise processes and reduce waste.

Read more...
Engineering in a world that cannot assume connectivity
Technews Publishing Editor's Choice News
Across industrial automation, networking, and defence systems, engineers are rediscovering the importance of resilience and autonomy in an increasingly connected world.

Read more...
Designing IoT devices for deterministic LPWAN environments
Editor's Choice Telecoms, Datacoms, Wireless, IoT
Built on Ultra Narrow Band communication technology, the Sigfox network focuses on low power, wide area M2M connectivity rather than maximising data throughput.

Read more...
Driving excellence in electronics manufacturing
Jemstech Editor's Choice Manufacturing / Production Technology, Hardware & Services
Jemstech’s reputation for disciplined execution and client-focused service has earned it strong loyalty from companies operating in demanding industries.

Read more...
In sync with the line
Testerion Editor's Choice Manufacturing / Production Technology, Hardware & Services
In modern SMT lines, stencil printing must meet two requirements at the same time: it has to ensure a reproducible solder paste volume, while adhering to the specified line cycle time.

Read more...
Resilient navigation in warfare: The role of non-GNSS
Etion Create Editor's Choice
Alternative navigation methods are essential for maintaining operational capability when satellite signals are unreliable or unavailable.

Read more...
Quectel’s RG255C-NA and RM255C-GL accelerate 5G RedCap adoption
iCorp Technologies Editor's Choice Telecoms, Datacoms, Wireless, IoT
Quectel’s RG255C-NA and RM255C-GL modules represent a strategic move into this fast-growing segment, delivering Sub-6 GHz 5G connectivity optimised for mid-tier IoT applications.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved