For years, many in the United States have viewed the traditional four year degree as the only path to a successful career. In late July, a new bill was introduced on the Hill that recognizes the need to change that mindset -- the New Collar Jobs Act. What exactly is a “new collar” job? According to IBM, the original advocate for building new collar career skills, new collar jobs are “roles in some of the technology industry’s fastest growing fields — from cybersecurity to digital design — that require technical training or some postsecondary education but not necessarily a four-year degree.” With the projected workforce shortage of 1.8 million by the year 2020, it is encouraging to see a growing
- Sep 14,
Name: Tom MusgraveTitle: Security EngineerEmployer: Warner Bros.Location: Burbank, California, U.S.A. Degree: BA HonsYears in IT: 17Years in cybersecurity: 16Cybersecurity certifications: CISSP, CCSP, GCIH, CCNA, CCNP Security How did you decide upon a career in cybersecurity? After leaving university, and a false start selling parrots for Harrods in Knightsbridge, I needed a change in direction. I joined a web design company as a junior IT engineer and reveled in the role. I then joined the new Cisco TAC support center in Milton Keynes. I was fortuitously recruited to the security team and thoroughly enjoyed troubleshooting all manner of VPN, Firewall and general networking problems. I love solving problems and implementing the security layer over already difficult network layer was a great challenge. I had no qualms in making cybersecurity
Sep 12,Spying, stealing, defacing. It’s been a busy week. These are the top security headlines for the week of August 28, 2017: The U.S. Navy says there’s no evidence of a cyber attack in the crash of the USS John S. McCain – but hypothetically, this is how it would work. Reuters reports cyber spies are using malware to target India and Pakistan – including decoy clickbait with Reuters reports. Yes, you read that right. Hurricane Harvey is a once in a 1,000 years disaster, but be careful before you donate. Scammers are registering domains to collect “donations” for bogus organizations. Have you ever wondered what happened to that old malware? CSO has a “Where are they now?” Ransomware is so
Sep 01,(ISC)² webcasts are a great source for insight into all areas of security. From the Internet of Things to malware and compliance, the topics vary. Here are the top 10 (ISC)² webcasts for 2017 so far as ranked by cybersecurity professionals: Part 1: Future of SIEM - Why Static Correlation Fails Insider Threat Detection Hackers stealing credentials and operating in your corporate network…disgruntled employees collecting customer lists and design materials for a competitor...malware sending identity information back to random domains…these common threats have been with us for years and are only getting worse. Most organizations have invested large amounts in security intelligence, yet these solutions have fallen short. Simply put, security intelligence and management, in the form of legacy
Aug 31,Name: Adam BoultonTitle: Senior Vice President, Security TechnologyEmployer: BlackBerryLocation: United KingdomDegree: Bachelor of Science (Honors) in Software EngineeringYears in IT: 12Years in cybersecurity: 12Cybersecurity certifications: CCSP, CISSP, CSSLP, CSTM, QSTM, OCJA How did you decide upon a career in cybersecurity? I’ve been really interested in technology for as long as I can remember. I was fortunate enough to know that since my early teens I wanted my career to be in software engineering. I am sure my story is very similar to many others, technology really captured my imagination from early on. I remember learning Assembly and QBasic, that is where it started for me. Then I started to learn about reverse engineering around the age of 16 and
Aug 29,