• Name: Rob Turner Title: Senior Cyber Network Defense AnalystEmployer: DXC Technology (formerly Hewlett-Packard Enterprise)Title: Computer Technology Program CoordinatorEmployer: Ball State UniversityLocation: Indiana, U.S.A.Education: BS in Computer Technology, Graduate Certificate in Information System Security Management, MS in Information and Communication SciencesYears in IT: 10Years in Cybersecurity: 7Cybersecurity certifications: CISSP-ISSAP, CISSP, CCNA-Security, CEH, CHFI, ECSA   How did you decide upon a career in cybersecurity? Cybersecurity had always been an aspect of my career as a systems analyst/administrator. The more proactive I became at securing systems and networks, the more research and interest I developed in the field of IT security – until the point where it became a primary responsibility. Why did you get your CISSP®? The CISSP was sought in

    Aug 07,
  • ATMs, HBO, democracy … what can’t be hacked? Here are the top security headlines for the week of July 31, 2017: IOActive hacked at ATM at Black Hat. I guess drinks are on them? Espionage was just a red herring. Apparently hackers in North Korea are looking for cash, not secrets. DefCon attendees shredded voting machines – some still being used in U.S. elections. Don’t worry, it’s for research. “If all your friends were downloading torrents, then would you too?” It seems like everyone is doing it, but even downloading just the BitTorrent clients (the software needed to run them) can make your device and data vulnerable to infection. Inspired by DefCon, Naked Security took a deep dive into Dark

    Aug 04,
  • We can’t all make it to Vegas for Black Hat, but we can get the scoop on what news came out of the annual infosec conference that took over the Mandalay Bay, and security headlines, for the week. So let’s dive into the top headlines from the week of July 24, 2017: Recruiting is flush in Vegas. With more industries than ever – AKA all of them – needing cybersecurity as a function, parties at BH are a way for recruiters to fill jobs.   Facebook is putting their money where their mouth is and investing $1M in funding for defensive research. They’re renewing their bug bounty sponsorship and working with Harvard to secure democracies. Thumbs up? But wait, there’s

    Jul 28,
  • Name: Ronald Ricohermoso Title: IS Security Operations AnalystEmployer: Ingram MicroLocation: Philippines Degree: BS in Computer ScienceYears in IT: 6Years in information security: 4Cybersecurity certifications: SSCP, Security+, CEH, ITIL Foundation   How did you decide upon a career in cybersecurity? I started working as a service desk, but decided to leave and specialize in other fields of IT (ex. networking or infrastructure). It started when I got a job at Ingram Micro as a security administrator and learned about the importance of information security and the challenges it offers due to the changing threat landscape. I learned that there is never a dull moment in infosec and it seemed to be an exciting field. I decided to then move forward with

    Jul 27,
  • Insights from the 2017 Global Information Security Workforce Study show that the IT players in your organization may be the key to filling the looming cybersecurity workforce gap. The survey was taken by 10,584 cyber and information security professionals in North America, and showed a projected 265,000 industry jobs will be left unfilled in 2022. Practitioners back up that data, with 68 percent indicating their organizations had too few security professionals. Filling a gap of that size with qualified professionals is daunting, but the help may already be in your organization in the information technology department. In North America, 87 percent of survey respondents indicated that cybersecurity was not their first career – and of those professionals, 70 percent were

    Jul 25,