Cybersecurity job searches increased nearly six percent between March 2017 and March 2018, according to recently published research by job listings site Indeed. The increase actually outpaced a 3.5 percent uptick in jobs posted. These numbers do not mean that supply is exceeding demand – far from it. The reality is that finding cybersecurity talent remains a major challenge for employers, both in and outside the tech field. But the Indeed findings seem to confirm what (ISC)² discovered earlier this year: There is a big appetite among cybersecurity workers for a change of employment. In our “Hiring and Retaining Top Cybersecurity Talent” study, (ISC)² found that 84 percent of cybersecurity workers would welcome new employment opportunities in 2018, including 14
- Jul 09,
By Ravindra Krishna, CISSP In a recent Operational Technology (OT) cyberattack, Monero Crypto-currency mining malware was discovered in the ICS network of a water utility company located in Europe. The company found the malware during a routine monitoring check of their OT network and confirmed that the malware infected five servers including the Human machine interface (HMI), which is used to control and manage physical components of OT networks. This attack provides further evidence that OT networks are not simply vulnerable, but actually easy targets. The Post-Stuxnet OT Cyberattack Era I believe that we can divide OT attacks into two eras: before Stuxnet and post-Stuxnet. The infamous worm was a fully loaded weapon completely made of code. The first source
Jul 03,