What is a Blue Teamer, and How Can They Protect Your Data?

Modern-day cybersecurity isn’t just about preventing and responding to threats; it’s about setting up defenses that can detect and respond to suspicious activity before it can do any damage. But to adequately protect an organization’s systems, a team of cybersecurity professionals needs to work together to put their security protocols to the test. To do […]

The post What is a Blue Teamer, and How Can They Protect Your Data? appeared first on Security Intelligence.

Continue reading What is a Blue Teamer, and How Can They Protect Your Data?

What is an Incident Response Professional?

As part of our ongoing series highlighting various roles in the cybersecurity industry, this article shines the light on the incident response professional. While there are many misconceptions surrounding the role, let’s examine a few frequently asked questions. How In-Demand is this Particular Role? Why?  Year after year, the story is the same: Cybersecurity jobs […]

The post What is an Incident Response Professional? appeared first on Security Intelligence.

Continue reading What is an Incident Response Professional?

What are the Duties of a Malware Analyst?

Malware breaches begin in many ways. Recently, multiple fake antivirus apps in the Google Play Store were infected with malware. Earlier this year, malware deployed through satellites shut down modems in Ukraine. Destructive malware attacks have an average lifecycle of 324 days (233 days to identify and 91 days to contain), compared to the global […]

The post What are the Duties of a Malware Analyst? appeared first on Security Intelligence.

Continue reading What are the Duties of a Malware Analyst?

What is a Pentester, and Can They Prevent Data Breaches?

With the cost of data breaches at an all-time high, organizations are working to proactively identify areas of risk on the network. Using pentesters to conduct penetration (pen) testing is becoming more common. To protect themselves, businesses must know their risk areas before hackers find vulnerabilities. Organizations can lower their attack risk by protecting against […]

The post What is a Pentester, and Can They Prevent Data Breaches? appeared first on Security Intelligence.

Continue reading What is a Pentester, and Can They Prevent Data Breaches?

One in four women in tech don’t feel valued

Making employees feel valued is about company culture and work-life balance, a survey found. Remote work and diverse recruitment efforts can make a difference.
The post One in four women in tech don’t feel valued appeared first on TechRepublic.
Continue reading One in four women in tech don’t feel valued

Bridging the 3.4 Million Workforce Gap in Cybersecurity

As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker gap; the total existing workforce is estimated at 4.7 million. Yet despite adding workers this past year, that gap continued to widen. Nearly 12,000 participants […]

The post Bridging the 3.4 Million Workforce Gap in Cybersecurity appeared first on Security Intelligence.

Continue reading Bridging the 3.4 Million Workforce Gap in Cybersecurity

How Do Threat Hunters Keep Organizations Safe?

Neil Wyler started his job amid an ongoing cyberattack. As a threat hunter, he helped his client discover that millions of records had been stolen over four months. Even though his client used sophisticated tools, its threat-hunting technology did not detect the attack because the transactions looked normal. But with Wyler’s expertise, he was able […]

The post How Do Threat Hunters Keep Organizations Safe? appeared first on Security Intelligence.

Continue reading How Do Threat Hunters Keep Organizations Safe?

6 Roles That Can Easily Transition to a Cybersecurity Team

With the shortage of qualified tech professionals in the cybersecurity industry and increasing demand for trained experts, it can take time to find the right candidate with the necessary skill set. However, while searching for specific technical skill sets, many professionals in other industries may be an excellent fit for transitioning into a cybersecurity team. […]

The post 6 Roles That Can Easily Transition to a Cybersecurity Team appeared first on Security Intelligence.

Continue reading 6 Roles That Can Easily Transition to a Cybersecurity Team

Laid Off by Big Tech? Cybersecurity is a Smart Career Move

Big technology companies are laying off staff as market conditions change. The move follows a hiring blitz initially triggered by the uptick in pandemic-powered remote work — according to Bloomberg, businesses are now cutting jobs at a rate approaching that of early 2020. For example, in November 2022 alone, companies laid off more than 52,000 […]

The post Laid Off by Big Tech? Cybersecurity is a Smart Career Move appeared first on Security Intelligence.

Continue reading Laid Off by Big Tech? Cybersecurity is a Smart Career Move

Outrageous Stories From Three Cyber Incident Responders

Working in cyber incident response can certainly make life interesting. Experiences typically run the gamut from exciting, dull, fun, repetitive and challenging. IBM Security commissioned a study from Morning Consult that surveyed over 1,100 cybersecurity incident responders across ten countries. Unsurprisingly, over two-thirds of respondents experienced daily stress or anxiety due to the pressures of […]

The post Outrageous Stories From Three Cyber Incident Responders appeared first on Security Intelligence.

Continue reading Outrageous Stories From Three Cyber Incident Responders