ATMs, HBO, democracy … what can’t be hacked? Here are the top security headlines for the week of July 31, 2017: IOActive hacked at ATM at Black Hat. I guess drinks are on them? Espionage was just a red herring. Apparently hackers in North Korea are looking for cash, not secrets. DefCon attendees shredded voting machines – some still being used in U.S. elections. Don’t worry, it’s for research. “If all your friends were downloading torrents, then would you too?” It seems like everyone is doing it, but even downloading just the BitTorrent clients (the software needed to run them) can make your device and data vulnerable to infection. Inspired by DefCon, Naked Security took a deep dive into Dark
Blog
Latest News & Tips
We can’t all make it to Vegas for Black Hat, but we can get the scoop on what news came out of the annual infosec conference that took over the Mandalay Bay, and security headlines, for the week. So let’s dive into the top headlines from the week of July 24, 2017: Recruiting is flush in Vegas. With more industries than ever – AKA all of them – needing cybersecurity as a function, parties at BH are a way for recruiters to fill jobs. Facebook is putting their money where their mouth is and investing $1M in funding for defensive research. They’re renewing their bug bounty sponsorship and working with Harvard to secure democracies. Thumbs up? But wait, there’s
Name: Ronald Ricohermoso Title: IS Security Operations AnalystEmployer: Ingram MicroLocation: Philippines Degree: BS in Computer ScienceYears in IT: 6Years in information security: 4Cybersecurity certifications: SSCP, Security+, CEH, ITIL Foundation How did you decide upon a career in cybersecurity? I started working as a service desk, but decided to leave and specialize in other fields of IT (ex. networking or infrastructure). It started when I got a job at Ingram Micro as a security administrator and learned about the importance of information security and the challenges it offers due to the changing threat landscape. I learned that there is never a dull moment in infosec and it seemed to be an exciting field. I decided to then move forward with
Insights from the 2017 Global Information Security Workforce Study show that the IT players in your organization may be the key to filling the looming cybersecurity workforce gap. The survey was taken by 10,584 cyber and information security professionals in North America, and showed a projected 265,000 industry jobs will be left unfilled in 2022. Practitioners back up that data, with 68 percent indicating their organizations had too few security professionals. Filling a gap of that size with qualified professionals is daunting, but the help may already be in your organization in the information technology department. In North America, 87 percent of survey respondents indicated that cybersecurity was not their first career – and of those professionals, 70 percent were
Name: Paul-Arnaud WernertTitle: Senior Manager, Cyber Risk & SecurityEmployer: BeijafloreLocation: Paris, FranceYears in IT: 13Years in cybersecurity: 13Cybersecurity certifications: CISSP How did you decide upon a career in cybersecurity? I started to be interested in cybersecurity during my engineering studies. I led a team of students to perform an organizational and technical security audit of the network of a French public company. This was the first experience for me to understand one context, identify its threats and assess associated risks, then explain to the management these risks and the way to mitigate them. After this project, I decided to keep working on cybersecurity topics, up to now! Why did you get your CISSP®? First I wanted to refresh and extend
From IoT to GoT, budget issues to interview busts, here are the top security headlines for the week of July 17, 2017: Who is a target for ransomware? Short answer: everyone. But education, government and healthcare organizations top the list. In math that doesn’t seem to add up, UK businesses estimate they would spend £1.1m to recover from a breach, but only 14.4% of their organisation’s operation budget is spent on infosec. We’ve mentioned the cybersecurity workforce gap a time or two, but what are entry-level job seekers doing that keeps them from getting the gig? Verizon has been breached and as many as 14 million subscribers may have had their records revealed. So maybe you should be asking, “Can