{"id":10071,"date":"2017-10-25T12:11:45","date_gmt":"2017-10-25T20:11:45","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/25\/news-3844\/"},"modified":"2017-10-25T12:11:45","modified_gmt":"2017-10-25T20:11:45","slug":"news-3844","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/25\/news-3844\/","title":{"rendered":"Here\u2019s Why You Should Consider A Career In Cybersecurity"},"content":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 25 Oct 2017 19:06:21 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Cybersecurity team working together at a computer workstation\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-300x169.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-768x432.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-1024x576.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-640x360.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-900x506.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-440x248.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-380x214.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>The need for more technologists with cybersecurity skills is undeniable. That may be an awkward way to phrase it, but it\u2019s a better representation that \u201ccybersecurity professionals.\u201d In today\u2019s world, everyone who works on and with technology needs to be aware of cybersecurity challenges. This week as part of <a href=\"https:\/\/staysafeonline.org\/ncsam\/about-ncsam\/\">National Cyber Security Awareness Month<\/a> (NCSAM), let&#8217;s take a closer look at what a career in cybersecurity looks like.<\/p>\n<blockquote>\n<p>The goal of security is simple: make sure that the technology does what it\u2019s supposed to&#8230;and only that.<\/p>\n<\/blockquote>\n<p>Most people assume that it\u2019s security\u2019s job to stop hackers and prevent breaches. That is part of it but only part. Cybersecurity teams work towards the same goal as the rest of IT, delivering technologies that help move the business forward. Solutions must be resilient and reliable to meet that goal<\/p>\n<p>With that broader perspective, you can start to get an idea of the diverse roles available within cybersecurity. Or more accurately, the blurring of lines between what were separate roles with other IT roles that now focus on security.<\/p>\n<p>The opportunity to apply cybersecurity knowledge shows up in all technology roles.<\/p>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/www.youtube.com\/embed\/UMIxcGKuFdU?feature=oembed\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p><b>4 Reasons To Specialize<\/b><\/p>\n<p>There are four main reasons why you should be passionate about diving into cybersecurity as a career focus.<\/p>\n<p><b>#1. Near unlimited potential growth<\/b><\/p>\n<p>A good cybersecurity professional works to understand as much about how about how technologies and organizations work as possible.<\/p>\n<p>A great cybersecurity professional realizes that the learning never stops.<\/p>\n<p>That\u2019s a massive opportunity to stay engaged and challenged. The possibilities for personal and career growth are endless.<\/p>\n<p><b>#2. Variety<\/b><\/p>\n<p>All of the opportunities for growth stem from the variety of technologies and situations security professionals face. If it uses ones and zeros, it has a cybersecurity component (and some roles even extend to physical security!).<\/p>\n<p>Security professionals get the chance to work directly with teams on technologies and systems they never dreamed of. From robots to cars to websites serving millions and millions of users, the variety is near infinite.<\/p>\n<p>That\u2019s an exciting career prospect. Bored is not a word you\u2019ll often be using.<\/p>\n<p><b>#3. Puzzles<\/b><\/p>\n<p>Add together the growth of technology, and it\u2019s variety, and you start to get a glimpse of the different types of puzzles that cybersecurity professionals have to deal with.<\/p>\n<p>In cybersecurity, we rely on some tried and true principles, but the current tactics can change day-to-day. There\u2019s always a new puzzle that needs to be solved.<\/p>\n<p>With each new wave of technology, new risks are created. It\u2019s the job of the security professional to identify, understand, and then help address these risks.<\/p>\n<p><b>#4. Impact<\/b><\/p>\n<p>Working with technology can make it hard to determine the impact of your work. Cybersecurity matters. It can extend beyond the digital world and into the physical one.<\/p>\n<p>Equifax hack impacted one hundred and forty-five million Americans. That impact was unconditionally negative, but for every Equifax, there are millions and millions of safe and secure transactions made online.<\/p>\n<p>From banking to buying to chatting with friends, security technologies make a lot of our current digital world possible.<\/p>\n<p><b>Start Learning, Keep Learning<\/b><\/p>\n<p>Cybersecurity has the two primary logistical requirements for an active career, low-to-no unemployment and reasonable compensation. But more importantly, it\u2019s a career that you\u2019ll never be bored with.<\/p>\n<p>If you choose this path, you\u2019ll always have room to grow. You\u2019ll continually be learning new skills and working to understand new technologies.\u00a0 New challenges will keep popping up, and you\u2019ll see a multitude of new people, situations, and opportunities.<\/p>\n<p>What more could you ask for in a career? Dive in now. Get learning.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/consider-a-career-in-cybersecurity\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 25 Oct 2017 19:06:21 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Cybersecurity team working together at a computer workstation\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-300x169.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-768x432.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-1024x576.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-640x360.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-900x506.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-440x248.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954-380x214.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/iStock-667849954.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The need for more technologists with cybersecurity skills is undeniable. That may be an awkward way to phrase it, but it\u2019s a better representation that \u201ccybersecurity professionals.\u201d In today\u2019s world, everyone who works on and with technology needs to be aware of cybersecurity challenges. This week as part of National Cyber Security Awareness Month (NCSAM),&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10789,11063,13134,714],"class_list":["post-10071","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-consumer","tag-data-privacy","tag-internet-protection","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10071"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10071\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10071"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}