Overcoming Appeasement: Think About Risk From the Business Out
For a couple of decades now, the career path of a cybersecurity professional has been evolving just like the rest of the tech industry. Years ago the top title was the dedicated “security officer,” who was generally also the CIO, the CFO, or some other officer of the company. read more more…Four ways to use open data sources to find cybersecurity candidates
It’s tough to grow a tech business in Silicon Valley when you’re competing against “sexier” companies like Lyft, Airbnb, Facebook and Google for the same cyber talent, says Mai Ton, vice president of human resources at OneLogin. But that’s the harsh reality for the identity and access management provider. The ongoing cyber skills shortage isn’t […] more…Look beyond job boards to fill cybersecurity jobs
The cybersecurity talent shortage keeps getting worse. According to Cybersecurity Ventures, the cost of cybercrime will double from $3 trillion globally in 2015 to $6 trillion by 2021. Meanwhile, the number of open cybersecurity jobs will increase from 1 million in 2016 to 1.5 million by 2019. Meanwhile, the scale and damage of the attacks […] more…What it takes to be a security incident responder
Cyber security response teams are keeping busy these days, with an abundance of hacking and other attacks launched against organizations on a regular basis. The professionals who make up these teams are skilled in evaluating and responding to such attacks in a timely manner and can minimize damage for organizations. “The demand for cyber security […] more…Se préparer au RGPD en 2017 – Deuxième partie : instaurer une culture de la protection de la vie privée et de la sécurité dès la conception
Cet article de blog est le deuxième d’une série dont le but est d’aider les dirigeants d’entreprise et les cadres responsables de la sécurité à se préparer au RGPD tout au long de l’année 2017. Les amendes… Sans doute le nouveau règlement général sur la protection des données de l’Union européenne est-il pour vous une […] more…IT threat evolution Q1 2017. Statistics
Q1 figures According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world. 79,209,775 unique URLs were recognized as malicious by web antivirus components. Attempted infections by malware that aims to steal money via online access to bank accounts were registered on […] more…Why Suffer the Stress of Being a Black-Hat Hacker?
As high school graduation ceremonies approach, we turn our attention toward what all those graduates are going to do next. Brought up in the digital age, these young people may be eagerly looking for opportunities to apply their technical skill sets, but there’s one career path that is not going to make parents proud – […] more…Get This 45 Hour Ethical Hacking Bootcamp For $45
From the finance sector to your local utility service, organizations across industries must protect themselves from cyber attacks. Not just a PR nightmare (think of giants like Yahoo! and Uber in the news for hacked customer info), threats range from ransomware and cyber extortion to an all-out failure of the electrical grid. Help thwart threats […] more…12 top tech fields of the future
Top jobs Image by Thinkstock Tech jobs of the future will include programmers, analysts, application and system developers, database and network administrators, engineers, designers, architects, scientists, researchers, statisticians, specialists, project and system managers, system and data integrators, technicians and tech support, quality controllers, trainers, and consultants in each of the following 12 areas. (Read the […] more…11 technologies developers should explore now
New and evolving technologies are rapidly reshaping how we work—offering creative opportunities for developers who are willing to pivot and adopt new skills. We took a look at 11 tech trends experts say are likely to disrupt current IT approaches and create demand for engineers with an eye on the future. It isn’t all about […] more…Ace 3 Globally Recognized IT Certifications with This Comprehensive Training Bundle, Now 88% Off – Deal Alert
Immerse yourself in comprehensive study materials for the CISSP, CISM and CISA exams with the Information Security Certification Training Bundle, now 88% off. These three courses tackle IT security holistically, allowing you to pursue the path that best fits your security interests. The CISSP prep course is an essential foundation for anyone who wants to begin […] more…Day Two and Beyond
It’s not often we get a chance to work on something truly amazing. To be a part of something new. But this week marks one such occasion. It’s a re-invention of one of the industry’s best known names. For someone like me who’s been around a few years, this is a great opportunity to help […] more…McAfee is Back – And Ready to Lead
Today we introduce a ‘new’ McAfee to the world. It’s the right move at the right time. Not only for us, but for the global cybersecurity industry. We have a clear roadmap to lead in innovation, and an opportunity to shape the marketplace as never before. The headlines we drive today span many dimensions. We […] more…Cloud security still a work in progress
A few years ago, ESG (and other) research indicated that security concerns posed the biggest impediment for more pervasive use of cloud computing. What happened next? Business executives and CIOs found that cloud agility, flexibility and potential cost savings were too good to pass up, creating a “cloud or bust” mentality. Naturally, CISOs had to do […] more…80% off Learn The Basics of Ethical Hacking and Penetration Testing Online Training – Deal Alert
Computer and network security is one of the fastest growing and most essential industries in technology, meaning companies will pay big bucks for ethical hackers. This is the perfect course to leap into this lucrative career, learning how to use ethical hacking to reveal potential vulnerabilities in information systems. By the end of this course […] more…It Begins: Bots Are Learning to Chat in Their Own Language
Igor Mordatch is working to build machines that can carry on a conversation. That’s something so many people are working on. In Silicon Valley, chatbot is now a bona fide buzzword. But Mordatch is different. He’s not a linguist. He doesn’t deal in the AI techniques that typically reach for language. He’s a roboticist who […] more…More information
- Apple CEO Tim Cook says China demand largely recovered, retail hit record high in Q2
- Microsoft Internet Explorer CVE-2019-1371 Remote Memory Corruption Vulnerability
- Google Glass to go on sale for one day next week
- WannaCry: the rush to blame XP masked bigger problems
- CSRF Vulnerability in Kudu SCM Allowed Code Execution in Azure Services
- What the Future of Google Glass Could Look Like
- Custom Chinese Malware Found on SonicWall Appliance
- G Data InternetSecurity 2013 review: Excellent protection, but a terrible user interface
- Infosec’s Hall of Fame 2013
- Beyond Bitcoin for Ransomware