4 Reasons to Consider a Security Marketing Internship

Reading Time: 3 minutes If you’re wired to innovate and eager to make the world a better, safer place alongside some of cybersecurity’s greatest minds, a security marketing internship may be right for you.

The post 4 Reasons to Consider a Security Marketing Internship appeared first on Security Intelligence.

Continue reading 4 Reasons to Consider a Security Marketing Internship

4 Ways to Overcome the Cyber Workforce Shortage

The supply/demand ratio for the cyber workforce is now about 2.3 skilled workers per job opening, according to NIST. Security leaders need to be more creative to fill the gaps in their teams.

The post 4 Ways to Overcome the Cyber Workforce Shortage appeared first on Security Intelligence.

Continue reading 4 Ways to Overcome the Cyber Workforce Shortage

How Allison Ritter Puts Security Lessons Into Action With Her Flare for Drama

A love of the visual arts and a passion for drama brought Allison Ritter to the IBM X-Force Command Center. She channels these passions to create engaging, interactive security lessons for clients.

The post How Allison Ritter Puts Security Lessons Into Action With Her Flare for Drama appeared first on Security Intelligence.

Continue reading How Allison Ritter Puts Security Lessons Into Action With Her Flare for Drama

Suspected North Korean hackers target universities using Chrome extension

While North Korean hackers are known for stealing money to finance Kim Jong Un’s authoritarian regime, Pyongyang may also be engaging in a cyber-espionage campaign targeting universities, new research shows. The hacking operation, which began in May, if not earlier, uses malicious Google Chrome extensions to gain a foothold into a victim’s computer, according to ASERT, the threat intelligence group of Netscout’s Arbor Networks. Once the hackers compromised a target network, they used “off-the-shelf tools,” like remote desktop protocol, to retain access to the network, according to ASERT.  The goal of the operation, dubbed “Stolen Pencil,” appears to be maintaining persistent access; researchers found no evidence of data theft. “A large number of the victims, across multiple universities, had expertise in biomedical engineering, possibly suggesting a motivation for the attackers’ targeting,” states the research, which was published Wednesday. The malicious extensions have been removed from the Google Play Store, ASERT says. Although […]

The post Suspected North Korean hackers target universities using Chrome extension appeared first on Cyberscoop.

Continue reading Suspected North Korean hackers target universities using Chrome extension

How Cloud Security Architect Andi Hudson Nurtures Today’s Youth to Protect Tomorrow’s Data

When he’s not helping clients stay on top of cloud security, Andi Hudson is reaching out to schools to spread awareness about careers in technology and the importance of data privacy.

The post How Cloud Security Architect Andi Hudson Nurtures Today’s Youth to Protect Tomorrow’s Data appeared first on Security Intelligence.

Continue reading How Cloud Security Architect Andi Hudson Nurtures Today’s Youth to Protect Tomorrow’s Data

3 Creative Strategies to Narrow the Skills Gap

The cybersecurity skills gap will continue to grow until executive leadership takes more creative steps to narrow it.

The post 3 Creative Strategies to Narrow the Skills Gap appeared first on Security Intelligence.

Continue reading 3 Creative Strategies to Narrow the Skills Gap

How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity

Just three years ago Ben Goodrich graduated with a degree in physics. Today he’s a security consultant working with the world’s biggest companies to provide an injection of cybersecurity expertise.

The post How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity appeared first on Security Intelligence.

Continue reading How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity

Why Security Career Journeys Need to Start From an Early Age

Encouraging young people to pursue a security career is not just the job of the public sector. Organizations that hire security professionals also have a responsibility to help grow this talent pool.

The post Why Security Career Journeys Need to Start From an Early Age appeared first on Security Intelligence.

Continue reading Why Security Career Journeys Need to Start From an Early Age

Were Millennials Born for a Career in Cybersecurity?

From high school to higher education, there are countless opportunities for security professionals and organizations to educate young people about a career in cybersecurity.

The post Were Millennials Born for a Career in Cybersecurity? appeared first on Security Intelligence.

Continue reading Were Millennials Born for a Career in Cybersecurity?