• Depending on the organization, entry- and junior-level cybersecurity professionals are assigned an assorted mix of tasks, according to new (ISC)² research. Junior-level employees typically are trusted to handle most tasks, the research shows. The findings come from a survey of 1,250 cybersecurity hiring managers showing wide variation in the roles that less-experienced hires are expected to take on. The study shows some differentiation between the types of tasks assigned to entry-level as opposed to junior-level employees. It also reveals greater agreement among respondents about what tasks junior-level employees can handle. Differences within level of responsibility assignments varying by company size also surfaced. Though somewhat surprising, the variation is not necessarily a bad thing. It suggests different companies are making task-assignment

    Sep 08,
  • Congratulations to the more than 1,500 individuals who passed the (ISC)² Certified in Cybersecurity℠ during our pilot program. They are now on their path to full certification!   If you’ve passed the Certified in Cybersecurity exam, our entry-level certification, you have proven to yourself, your peers and hiring managers that you have the strong problem-solving abilities, communication skills, strategic thinking skills and an eagerness to learn needed to be a successful cybersecurity professional, according to experts who participated in the (ISC)² Workforce Study.  Once you pass the Certified in Cybersecurity exam and become a member of (ISC)², you have access to a variety of educational materials, discounts, events and much more to enhance your cybersecurity career.   (ISC)² Membership Benefits  Professional development

    Sep 06,
  • Cryptocurrency crime, tech vulnerabilities and high-profile breaches rock the cybersecurity world this week. Here are the latest threats and advisories for the week of September 2, 2022. Threat Advisories and Alerts Over $1 Billion Stolen in Cryptocurrency on Decentralized Finance Platforms The FBI warns investors to heed caution when using decentralized finance (DeFi) platforms. Between January and March 2022, $1.3 billion was stolen in cryptocurrencies, of which nearly 97% occurred on DeFi platforms. Before investing, the FBI recommends investors to research prospective DeFi platforms, smart contracts and protocols. Those who believe their DeFi investments have been stolen should contact the FBI via their local FBI field office or the Internet Crime Complaint Center. Source: https://www.ic3.gov/Media/Y2022/PSA220829 Atlassian Bitbucket Vulnerability Scores 9.9

    Sep 02,
  • (ISC)² is making a cybersecurity career more accessible. As part of our commitment to help close the cybersecurity workforce gap and diversify those working in the field, we are offering FREE (ISC)² Certified in Cybersecurity Online Self-Paced Training and exams to one million people worldwide. To qualify, individuals must enroll as an (ISC)² Candidate, for free, which entitles them to a wide array of exclusive programs and services to assist individuals starting a cybersecurity career, including free education and exams for the association’s new entry-level cybersecurity certification (ISC)² Certified in Cybersecurity. How to Enroll in One Million Certified in Cybersecurity To participate in the One Million Certified in Cybersecurity program, follow these simple steps: Sign up as an (ISC)² Candidate

    Sep 02,
  • “The unfilled demand of cybersecurity positions is 2.72 million, down from 2020. However, it is primarily coming from Asia because every region around the globe went up, demand outpacing supply, except for in Asia,” Clar Rosso said in discussing the (ISC)² 2021 Cybersecurity Workforce Study on Techstrong TV.  The Workforce Study showed that 61% of the Asia-Pacific region (APAC) cybersecurity professionals surveyed, 1,234 participants, feel their organization lacks a sufficient amount of cybersecurity talent (people and/or skills). The response was much greater in China, with 74% reporting the need for more professionals in the field.   This need for more cybersecurity professionals in the region not only puts pressure on working teams but can put organizations at risk of experiencing a

    Sep 01,