By Adrian Davis, CISSP, Managing Director EMEA, (ISC)² The National Crime Agency recently revealed a fascinating intelligence assessment, uncovering the ‘pathways into cyber crime’. The key finding was that most young hackers are motivated, not by financial reward, but by idealism. The NCA added that many of those involved in cyber-crime had “highly marketable” skill sets, and evidence showed that positive role models could help steer ex-offenders towards productive technology careers. Many people feel that re-training young cyber offenders as cyber security professionals offers a chance to kill two birds with one stone; reducing cyber-crime and simultaneously helping to reduce the cyber skills shortage. The NCA proposed creating a “toolkit of positive diversions” for young people deemed to be at
- Aug 16,
UMUC Center for Security Studies (CSS) is seeking highly qualified candidates for the Cybersecurity Advanced Degree Fellowship (CADF) program. Candidates should be interested in research and in teaching cybersecurity and digital forensics. If you are interested, please make sure to read the program announcement instructions before you fill out and submit your application (also attached) by the deadline of August 24 at 11:59 p.m. Link1: Program Announcement Link 2: Program Application
Aug 15,(ISC)² is proud to announce that our membership has surpassed 125,000 certified cybersecurity professionals globally. As demand for skilled security professionals continues to grow exponentially, (ISC)² certification and continuing education programs enable cybersecurity and IT security practitioners to prove their expertise, advance their careers and contribute to a more secure society. Here’s what some members are saying about the milestone: "125,000 members is a very large number for a community of dedicated people continuously raising the bar by learning, researching, teaching and sharing their knowledge and skills to make our cyber world safer,” said Emmanuel Nicaise, CISSP, president, (ISC)² Belux Chapter. “Becoming an (ISC)² member is more than passing an exam, it's
Aug 15,WannaCry and NotPetya aftermath means payouts and panic. Here are the top security headlines for the week of August 7, 2017: Big money, no whammies! It seems like the hackers behind WannaCry have cashed out their bitcoin into Monero, a harder to track cryptocurrency. Mo money means mo malware. The success – can we call it that? – of WannaCry and NotPetya means ransomware is not going away any time soon, because… well, people and businesses pay the ransom. What’s that definition of insanity? Oh yeah, doing the same thing and expecting a different result… Tripwire research indicates that two-thirds of security pros don’t think their organization has made the necessary improvements since this summer’s ransomware attacks. Your route
Aug 11,Building an effective SIEM requires ingesting log messages and parsing them into useful information. While it might be easy to stream, push and pull logs from every system, device and application in your environment, that doesn’t necessarily improve your security detection capabilities. What you do with your logs – correlation, alerting and automated response – are the strength of a SIEM. Real-time security starts with understanding, parsing and developing actionable information and events from your log messages. With the launch of a new site, (ISC)² was presented an opportunity to refine our security monitoring services. Linked below is an example of how we improved visibility on attacks against our web properties via web application firewall logs. We hope this brief
Aug 09,