• The International Association of Privacy Professionals (IAPP) and (ISC)² teamed up to dive into similar challenges facing security and privacy professionals in a constantly evolving world. The latest (ISC)² Workforce Study shows an IT background – either from education or work experience – remains the most common point of entry for cybersecurity roles as 63% of participants reported it as their path to cybersecurity. This percentage has lowered in recent years, giving way to a variety of other entry points. Today, just over one-third of cybersecurity professionals get their start outside of IT. This number continues to expand as the profession sees exponential growth and businesses embrace diversity in order to bridge the workforce gap of 3.4 million and protect

    Nov 02,
  • By Allen Ari Dziwa, CISSP, CCSP a risk specialist and SME for the Federal Reserve Bank of Cleveland. He has worked in technology and cybersecurity consulting for 15 years. Allen currently serves on the Board of Directors of ISSA North Texas, E-Council’s Ethical Hacking Advisory Board and contributed to CISSP reviews for (ISC)². He is a certified ethical hacker and certified threat intelligence analyst. The purpose of a Board of Directors is to provide governance and hold senior management accountable, including implementing cybersecurity strategy within established cyber risk appetite. A goal for any organization is generating revenue from business activities, which in most cases involves the use of technology and systems exposed to the internet. The use of technology and

    Nov 01,
  • In the final part of this three-part mentorship series for Cybersecurity Awareness Month we are discussing the advantages and challenges of reverse mentorship. Hear from two members who dared to embark on the complex world of reverse mentorship and shared their experiences with us. Read more about becoming a mentor and mentee in our part 1 and part 2 of this blog series. Chinatu Uzuegbu, CISSP, CEO/Managing Cyber Security Consultant at RoseTech CyberCrime Solutions Ltd. How would you describe reverse mentorship? Reverse mentorship is a process of being trained or mentored by a younger or junior position as a more experienced or senior member of the team. It is a knowledge transfer session from let us say, a college graduate

    Oct 31,
  • Tech giant vulnerabilities, menacing malware and child abductions via rideshare apps…. Here are the latest threats and advisories for the week of October 28, 2022. Threat Advisories and Alerts Daixin Team Ransomware Group Targets U.S. Businesses The FBI and CISA released a joint cybersecurity advisory to warn companies of the cybercrime group Daixin Team. The threat actors are a ransomware and data extortion group that have been actively targeting U.S. businesses since at least June 2022, mostly in the healthcare sector. The group gains access to victims’ systems via virtual private network (VPN) servers, and then moves laterally via Remote Desktop Protocol and Secure Shell. See the full advisory for more details, mitigations and how to prepare for a ransomware

    Oct 28,
  • Over the past two years, the workforce has changed in unimaginable ways. Hybrid work is now the norm, leadership strategies have evolved to encompass the new way of work, and workers are taking the time to decide if they actually like their job. We have witnessed the highest resignation numbers in decades – according to the World Economic Forum, 4.4 million workers left their jobs in September 2021 alone! However, the Great Resignation can be your Great Opportunity, especially if you are pursuing a career in cloud security. The Great Resignation brings Great Opportunities You have probably seen headlines about “The Great Resignation.” A Prudential survey says 26% of employees plan to look for a job at a different company

    Oct 26,