Smashing Security podcast #250: Yes, you heard that correctly. Two hundred and fifty

A game about Squid Game pulls the rug from under cryptocurrency investors in what appears to be a scam, PayPal hackers use a devious trick to break into 2FA-protected accounts, and have you received a job offer that’s too good to be true?

All this a… Continue reading Smashing Security podcast #250: Yes, you heard that correctly. Two hundred and fifty

Cybersecurity Job Seekers: Go West (or South)

Job seekers looking to get into the cybersecurity field: Now is the time. Talented cybersecurity candidates are in such high demand that hiring managers are having trouble closing the deal when they present job offers. Unemployment is so low that if c… Continue reading Cybersecurity Job Seekers: Go West (or South)

InfoSec Recruiting – Is the Industry Creating its own Drought?

The InfoSec industry has a crippling skills shortage, or so we’re told. There’s a constant stream of articles, keynotes, research and initiatives all telling us of the difficulty companies have in finding new talent. I’ve been in the … Continue reading InfoSec Recruiting – Is the Industry Creating its own Drought?

Untold Stories of the NOC – Network Operations Center

Spending days and nights monitoring your own network, as well as others, would probably seem like a mundane task to majority of people, but like any other job there are certain days that can stick out in your mind. For the ones that are not familiar wi… Continue reading Untold Stories of the NOC – Network Operations Center

[SANS ISC] Adding Persistence Via Scheduled Tasks

I published the following diary on isc.sans.org: “Adding Persistence Via Scheduled Tasks“: Once a computer has been infected by a malware, one of the next steps to perform is to keep persistence. Usually, endpoints (workstations) are primary infection vectors due to the use made of it by people: they browse

[The post [SANS ISC] Adding Persistence Via Scheduled Tasks has been first published on /dev/random]

Continue reading [SANS ISC] Adding Persistence Via Scheduled Tasks

Tips to Begin a Cybersecurity Career

I have worked in the cybersecurity space for about 14 years now. I found my way into cybersecurity from being a network engineer who needed to fill a technology gap on my then team – as a security subject matter expert. I have been approached ove… Continue reading Tips to Begin a Cybersecurity Career

Tips to Begin a Cybersecurity Career

I have worked in the cybersecurity space for about 14 years now. I found my way into cybersecurity from being a network engineer who needed to fill a technology gap on my then team – as a security subject matter expert. I have been approached ove… Continue reading Tips to Begin a Cybersecurity Career

Break into an Information Security Career

National Cyber Security Awareness Month week 4 theme is: The Internet Wants You: Consider a Career in Cybersecurity. Considering the cybersecurity skill shortage, (Frost & Sullivan and (ISC)2 found that the global cybersecurity workforce will have more than 1.5 million unfilled positions by 2020) we should be encouraging students to enter into a cybersecurity career.  However,…

The post Break into an Information Security Career appeared first on CCSI.

The post Break into an Information Security Career appeared first on Security Boulevard.

Continue reading Break into an Information Security Career