• “Cloud is the present, and the future. It affects everything, every day, both in business and our personal lives.” With these words Panagiotis Soulos summarizes his philosophy of why the CCSP credential is important to any cybersecurity professional. Panagiotis holds the position of the Global Information  Security Manager in Global Information Security at Intrum. We recently had the opportunity to learn more about his career.Q: What is your current position at Intrum? A: I recently changed positions, moving from Information Security Officer, into leading a new unit that will be help Intrum to manage and control all aspects of their information security compliance. Another colleague will take over my former role. I will be a leader of a team that

    Mar 22,
  • KillNet is bad for your health, TikTok facing further bans, ransomware impacts cancer test results, Russia allegedly increasing its cyberwarfare efforts.   By Joe Fay  Microsoft Demonstrates How KillNet Is Bad for Our Healthcare Sector  Microsoft has highlighted a rise in DDoS attacks on healthcare organizations, mapping a three-fold increase in attacks over three months. It said it tracked 10 to 20 attacks per day on healthcare organizations on Azure in November but was seeing 40 to 60 per day in February. The attack mix changed over this time, it added, with over half of attacks now being UDP floods, with 44% being TCP-based. It said that pro-Russia hacktivist group KillNet has been launching “waves of attacks against Western countries, targeting

    Mar 21,
  • This month, we asked women in the (ISC)² Blog Volunteers group to weigh in on a few questions from their perspective as a female working in cybersecurity. While their experiences in the industry have varied, this group unanimously responded that they currently receive equal pay to their male counterparts. These volunteers also feel that they receive the same opportunities for promotion and growth as the males on their teams. However, when asked if the ratio of women to men working around them has increased in recent years, the group was split, about 50/50, half agreeing yes, they have seen more women and half stating there is no visible change in their team’s demographic.   Here are some of our key

    Mar 20,
  • By John E. Dunn  Phishing attacks depend on creating huge numbers of lookalike ‘confusable’ domains. A new report has highlighted the most prevalent examples and suggested a way to detect phishing domains before they are used in anger.   Ever since phishing attacks gathered steam two decades ago, the ability of criminals to create ‘confusable’ or typosquatting domains that look plausibly similar to real ones has been a thorn in everyone’s side.  Companies have their brands hijacked, users are tricked into clicking on phishing emails that look genuine, and registrars are roundly criticized for allowing all of this to happen.  Large companies employ admins or third-party service providers to watch out for and block these domains soon after they are registered

    Mar 20,
  • Are you ready to take your (ISC)² exam? If so, there is a slight change to the process! When you’re ready to schedule your exam, please log in to your account at isc2.org.* Whether you’re pursuing your first (ISC)² certification, a certified member pursuing an additional certification or an (ISC)² Candidate, you will log in to your account on the Register for Your Exam page. Then, visit https://my.isc2.org/s/ISC2-Pearson to fill out your Exam Account Information form. Once you fill it out, review the information to confirm it matches the ID you’ll use at your test center. Submit the form and you’ll be transferred to the Pearson VUE website to schedule your exam. Click View Exams and select your (ISC)² exam

    Mar 17,