What is a Red Teamer? All You Need to Know

A red teamer is a cybersecurity professional that works to help companies improve IT security frameworks by attacking and undermining those same frameworks, often without notice. The term “red teaming” is often used interchangeably with penetration testing. While the terms are similar, however, there are key distinctions. First and foremost is the lack of notice […]

The post What is a Red Teamer? All You Need to Know appeared first on Security Intelligence.

Continue reading What is a Red Teamer? All You Need to Know

What is a Blue Teamer, and How Can They Protect Your Data?

Modern-day cybersecurity isn’t just about preventing and responding to threats; it’s about setting up defenses that can detect and respond to suspicious activity before it can do any damage. But to adequately protect an organization’s systems, a team of cybersecurity professionals needs to work together to put their security protocols to the test. To do […]

The post What is a Blue Teamer, and How Can They Protect Your Data? appeared first on Security Intelligence.

Continue reading What is a Blue Teamer, and How Can They Protect Your Data?

What is an Incident Response Professional?

As part of our ongoing series highlighting various roles in the cybersecurity industry, this article shines the light on the incident response professional. While there are many misconceptions surrounding the role, let’s examine a few frequently asked questions. How In-Demand is this Particular Role? Why?  Year after year, the story is the same: Cybersecurity jobs […]

The post What is an Incident Response Professional? appeared first on Security Intelligence.

Continue reading What is an Incident Response Professional?

What are the Duties of a Malware Analyst?

Malware breaches begin in many ways. Recently, multiple fake antivirus apps in the Google Play Store were infected with malware. Earlier this year, malware deployed through satellites shut down modems in Ukraine. Destructive malware attacks have an average lifecycle of 324 days (233 days to identify and 91 days to contain), compared to the global […]

The post What are the Duties of a Malware Analyst? appeared first on Security Intelligence.

Continue reading What are the Duties of a Malware Analyst?

What is a Pentester, and Can They Prevent Data Breaches?

With the cost of data breaches at an all-time high, organizations are working to proactively identify areas of risk on the network. Using pentesters to conduct penetration (pen) testing is becoming more common. To protect themselves, businesses must know their risk areas before hackers find vulnerabilities. Organizations can lower their attack risk by protecting against […]

The post What is a Pentester, and Can They Prevent Data Breaches? appeared first on Security Intelligence.

Continue reading What is a Pentester, and Can They Prevent Data Breaches?

One in four women in tech don’t feel valued

Making employees feel valued is about company culture and work-life balance, a survey found. Remote work and diverse recruitment efforts can make a difference.
The post One in four women in tech don’t feel valued appeared first on TechRepublic.
Continue reading One in four women in tech don’t feel valued

Bridging the 3.4 Million Workforce Gap in Cybersecurity

As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker gap; the total existing workforce is estimated at 4.7 million. Yet despite adding workers this past year, that gap continued to widen. Nearly 12,000 participants […]

The post Bridging the 3.4 Million Workforce Gap in Cybersecurity appeared first on Security Intelligence.

Continue reading Bridging the 3.4 Million Workforce Gap in Cybersecurity

How Do Threat Hunters Keep Organizations Safe?

Neil Wyler started his job amid an ongoing cyberattack. As a threat hunter, he helped his client discover that millions of records had been stolen over four months. Even though his client used sophisticated tools, its threat-hunting technology did not detect the attack because the transactions looked normal. But with Wyler’s expertise, he was able […]

The post How Do Threat Hunters Keep Organizations Safe? appeared first on Security Intelligence.

Continue reading How Do Threat Hunters Keep Organizations Safe?

6 Roles That Can Easily Transition to a Cybersecurity Team

With the shortage of qualified tech professionals in the cybersecurity industry and increasing demand for trained experts, it can take time to find the right candidate with the necessary skill set. However, while searching for specific technical skill sets, many professionals in other industries may be an excellent fit for transitioning into a cybersecurity team. […]

The post 6 Roles That Can Easily Transition to a Cybersecurity Team appeared first on Security Intelligence.

Continue reading 6 Roles That Can Easily Transition to a Cybersecurity Team