• Why are goal-oriented individuals more likely to thrive professionally? Because they know where they want to go. But accomplishing anything meaningful takes drive and dedication. Most of all, it requires a clearly defined plan and inspiration to stay on track. A milestone like achieving (ISC)2 certification is a powerful motivator, especially when you consider the rewards that come with it. Was 2019 the year you wanted to earn an (ISC)2 credential to enter a high-demand field, enhance your cybersecurity skills or increase job security? Perhaps you even started preparing, but got sidetracked by life’s demands. We really do get it… taking on (ISC)2 certification is a BIG commitment. But ask yourself: If not now, when? Chances are there will never

    Jan 29,
  • As use of the internet becomes more acceptable in schools and expected at younger ages, cyber safety education is a necessity. While tablets, computers and smart devices are the norm at home and school for children, many students are not taught about the potential dangers faced while using technology. Shockingly, 40% of students in fourth through eighth grades have chatted with a stranger online, of those, 53% gave out their phone number to the stranger and 11% met with a stranger according to Children’s Internet Usage Study. Statistics like these are the impetus behind the mission of the Center for Cyber Safety and Education and its city-wide educational event “Cyber Safety Day.” This one-day event, created by the nonprofit, educates

    Jan 28,
  • As demand for cloud computing grows, so does the need to secure it. In a survey of its Technology Executive Council members, CNBC found that cloud and software-defined security are among the C-suite’s top technology strategies for 2020. As reported in this video, cloud computing tops the list, and it’s followed by machine learning, artificial intelligence and software-defined security. The CNBC Technology Executive Council has nearly 150 executives in various industries, 70% of whom participated in the survey. The survey shows that securing cloud environments is a major priority – not only for the C-suite but also for cybersecurity workers. Another study, by the SANS Institute, provides further proof. "The SANS survey showed that rapid movement of corporate services and

    Jan 27,
  • By Dr. Thomas P. Scanlon, CISSP Software Engineering Institute, Carnegie Mellon University Today’s software developers are as much integrators as they are pure coders. There is an abundance of libraries, plug-ins and other third-party software components readily available to speed development. There is no sense in reinventing something when you can just download it, merge it in and move along. Using free and open source software (FOSS) components can save both time and money, so they make for attractive choices. However, including open source software into development projects often makes the cybersecurity professionals in an organization a little uneasy. But, should it? There is often a misconception that FOSS components are ‘less secure’ than commercial products. The reality is that

    Jan 24,
  • Here’s a bit of good news for anyone contemplating a career in cybersecurity: Cybersecurity workers who started their careers in other fields tend to get paid more than career-long cybersecurity professionals, according to new research. As reported by Security Boulevard, a survey conducted by Cynet, which makes breach detection tools, reveals that cybersecurity professionals with equivalent experience earn about the same regardless of whether they have a degree in computer science or a related engineering field. But those who started their careers outside of cybersecurity command higher salaries, a strong indication that employers – in the face of a skills shortage and 0% unemployment in the cybersecurity profession – are willing to open their wallets for recruits from other fields.

    Jan 23,