Here’s Why You Should Consider A Career In Cybersecurity
Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 25 Oct 2017 19:06:21 +0000
The need for more technologists with cybersecurity skills is undeniable. That may be an awkward way to phrase it, but it’s a better representation that “cybersecurity professionals.” In today’s world, everyone who works on and with technology needs to be aware of cybersecurity challenges. This week as part of National Cyber Security Awareness Month (NCSAM),…
Connected cars and autonomous vehicles are getting all the headlines these days, especially when it comes to cybersecurity concerns. But that’s only half of the story. An under-reported but hugely important piece of the puzzle relates to the Intelligent Transportation Systems (ITS) needed to create truly smart cities. Governments around the world, including the US,…
Although this type of strain might not be as well covered as other flashy strains, fileless malware is a hidden threat that should concern businesses.
Various forms of fuzzing techniques that search for vulnerabilities in software programs have been around for several decades, but it can a tedious task, especially when looking at an entire enterprise application. Earlier this week, Zero Day Initiative (ZDI) vulnerability researcher Abdul-Aziz Hariri published a blog detailing how to fuzz the image conversion feature of…
In spite of a rapidly evolving landscape, data breaches remain among the most common and damaging cyber-threats facing organizations today. As digital transformation efforts take hold, so the corporate attacks surface grows, offering more opportunities for the bad guys to take aim at highly prized IP and customer data. They also have the element of…
Making predictions is a tricky business and in no area more so than in the area of rapidly developing technology. The pace of change continues to accelerate and the nature of innovation is such that entrepreneurs, as well as criminals are continually searching for “the next big thing” to either benefit or to blight our…
It started as a small idea. Get a bunch of good people together, away from the pressures of their offices, and see if they could address some of the issues operational security teams have to deal with. Better monitoring tools; better analysis tools; new ways to generate threat indicators and feeds. That first year was…
No matter how small your business is, it still serves as a lucrative target for cyber criminals.