How can I safely write in my resume that I have written a MetaSploit exploit module without making employers nervous?

I have asked this question on The WorkPlace SE site and did not receive any comprehensive answers over there. I have around 10 years of cybersecurity industry experience and have gained proficiency in using MetaSploit framework for automa… Continue reading How can I safely write in my resume that I have written a MetaSploit exploit module without making employers nervous?

What viable methods can be used to prevent bypassing of country IP blacklisting edge controls by using VPN?

I work in the cybersecurity division of my employer in a regulated field.
Where I work, edge perimeter controls on firewall are set up to DENY All incoming connections originating in blacklisted countries (e.g: North Korea). If an employee… Continue reading What viable methods can be used to prevent bypassing of country IP blacklisting edge controls by using VPN?

Posted in VPN

What strategies can I use to negotiate security terms in vendor contracts for vendors in high geopolitical risk countries?

Please assume the following in responding:

Data being passed to vendor is subject to data protection laws in the USA such as GLBA

Data itself resides within the United States

Switching vendors will be difficult due to tight integration … Continue reading What strategies can I use to negotiate security terms in vendor contracts for vendors in high geopolitical risk countries?

Is gamification to encourage increased end user awareness of company security policy a good idea? [closed]

I am a member of the IT security team of a large organization in the financial services industry. I have been with my employer for about 7 years, and am well respected, often serving in advisory capacity to management. Recently we started … Continue reading Is gamification to encourage increased end user awareness of company security policy a good idea? [closed]