The Cybersecurity Crisis: Companies Can’t Fill Roles, Workers Shut Out

Forbes - Feb 5th, 2025
Open on Forbes

The cybersecurity industry is facing a paradoxical situation: a severe shortage of skilled professionals with an estimated 4.8 million job openings globally, yet companies are outsourcing critical security tasks overseas rather than nurturing local talent. This situation is further aggravated by a massive wave of IT layoffs, pushing skilled professionals like networking engineers and software developers into seeking new career paths. Cybersecurity represents a promising transition due to the transferable technical skills of these professionals. However, the industry must address the barriers to entry, such as the 'experience required' paradox for entry-level roles, and the need for practical training beyond academic degrees.

This talent shortage has significant implications for both job seekers and national security. Companies' reliance on outsourcing rather than developing domestic talent weakens cybersecurity resilience. Educational institutions are also criticized for failing to bridge the gap between cybersecurity education and practical job readiness, leaving many graduates frustrated. The story highlights the need for structured training programs, mentorship from industry leaders, and the importance of networking in securing job opportunities. With AI reshaping cybersecurity roles, the demand for skills in AI-driven security tools is rising, underscoring the need for comprehensive education and continuous learning in the field.

Story submitted by Fairstory

RATING

6.8
Fair Story
Consider it well-founded

The article provides a comprehensive overview of the cybersecurity talent shortage, effectively highlighting the challenges and opportunities within the field. Its strengths lie in its clarity, timeliness, and public interest, as it addresses a critical issue that affects a wide range of stakeholders. The article is well-structured and readable, making complex information accessible to a broad audience.

However, the article could improve in areas such as source quality and transparency by incorporating a wider array of authoritative references and providing more explicit citations. Additionally, while it touches on controversial topics, it lacks a deep exploration of opposing viewpoints, limiting its potential to provoke debate or challenge established norms.

Overall, the article is a valuable resource for readers seeking to understand the cybersecurity talent gap, but it could enhance its impact and engagement by offering more detailed recommendations and exploring diverse perspectives.

RATING DETAILS

8
Accuracy

The article presents a generally accurate depiction of the cybersecurity talent shortage, citing an estimated 4.8 million unfilled jobs globally according to the 2024 ISC2 Cybersecurity Workforce Study. This aligns with industry reports highlighting the significant gap between demand and supply of skilled professionals. However, the precise number of unfilled positions can vary slightly across different sources, warranting further verification.

The claim that companies are outsourcing critical security functions overseas is consistent with industry practices aimed at cost savings, although the extent and impact of this outsourcing are not universally quantified. The article accurately notes the potential risks associated with this practice, such as weakened national cybersecurity resilience.

The mention of IT layoffs and the transition of displaced professionals into cybersecurity roles is factual, reflecting current market dynamics. The narrative around certifications and the importance of real-world experience is well-supported by industry standards, emphasizing that while certifications like Security+, CEH, or CISSP are valuable, they are not standalone solutions.

Overall, the article accurately reflects the challenges and opportunities within the cybersecurity field, though it could benefit from more precise data points and additional sources to enhance its factual robustness.

7
Balance

The article provides a balanced view by discussing both the challenges and opportunities in the cybersecurity job market. It highlights the talent shortage and the outsourcing issue while also focusing on the potential for IT professionals to transition into cybersecurity roles. This dual perspective ensures that the reader understands both sides of the argument.

However, the article could improve its balance by incorporating more perspectives from industry experts, educators, and policymakers. Currently, the narrative leans slightly towards the challenges faced by job seekers and companies, without equally exploring the efforts being made to address these issues.

The discussion on the role of degrees and certifications offers a balanced view by acknowledging their importance while also emphasizing the need for practical experience. This nuanced approach helps to present a comprehensive picture of the cybersecurity job market.

In summary, while the article covers multiple angles, it could benefit from a broader range of viewpoints to fully encapsulate the complexity of the cybersecurity talent shortage.

8
Clarity

The article is generally clear and well-structured, with a logical flow that guides the reader through the complex issues surrounding the cybersecurity talent shortage. The use of subheadings and concise paragraphs helps to organize the information effectively, making it accessible to a broad audience.

The language used is straightforward and avoids unnecessary jargon, ensuring that readers with varying levels of familiarity with the topic can understand the key points. The article successfully conveys the urgency of the cybersecurity skills gap and the potential solutions in a manner that is both informative and engaging.

However, the article could improve clarity by providing more specific examples or case studies to illustrate the points made. This would help to ground the discussion in real-world scenarios and enhance the reader's understanding of the issues.

Overall, the article's clarity is a strong point, effectively communicating complex information in a reader-friendly format.

6
Source quality

The article references the 2024 ISC2 Cybersecurity Workforce Study, which is a reputable source in the field, lending credibility to its claims about the talent shortage. However, the article would benefit from citing additional authoritative sources to strengthen its arguments, such as academic studies, industry reports, or expert opinions.

While the article discusses well-known issues within the industry, there is a lack of direct attribution to specific studies or experts for several claims, such as the impact of outsourcing on national security or the precise role of AI in transforming cybersecurity careers.

The absence of diverse sources or voices from different stakeholders, such as cybersecurity professionals, educators, or policymakers, limits the depth of the analysis. Including these perspectives would enhance the article's reliability and provide a more comprehensive understanding of the issues at hand.

Overall, while the article is grounded in a credible source, it could improve its source quality by incorporating a wider array of authoritative references.

5
Transparency

The article lacks explicit transparency regarding its sources and methodologies. While it references the 2024 ISC2 Cybersecurity Workforce Study, it does not provide direct links or citations for readers to verify the information independently. This limits the reader's ability to assess the validity of the claims presented.

The article could improve transparency by clearly outlining the basis for its claims, such as providing detailed data points or referencing specific sections of studies or reports. Additionally, acknowledging any potential conflicts of interest or biases in the sources used would enhance the article's transparency.

The lack of transparency in how the information was gathered or the criteria used to evaluate the cybersecurity talent shortage and outsourcing practices leaves room for doubt regarding the impartiality of the article. Providing more context and explanation would help readers understand the foundation of the article's assertions.

In conclusion, the article would benefit from greater transparency in its sourcing and methodology to build trust and credibility with its audience.

Sources

  1. https://www.nucamp.co/blog/coding-bootcamp-cybersecurity-2025-how-is-the-cybersecurity-job-market-expected-to-evolve-in-2025
  2. https://beamstart.com/news/the-cybersecurity-crisis-companies-cant-1738774072
  3. https://cybersecurityventures.com/jobs/
  4. https://fieldeffect.com/blog/overcoming-the-cybersecurity-talent-shortage
  5. https://www.institutedata.com/blog/careers-in-cyber-security-transitioning-in-2025/