• Understanding which certification is right for you can be a daunting task. (ISC)² itself has a portfolio of credentials related to cybersecurity, with specializations in certain areas. Credential Engine hopes to help people navigate the sometimes-cloudy world of certifications. Launched on December 7, 2017, Credential Engine is a nonprofit organization dedicated to promoting transparency and literacy in the credential marketplace, to make it easier for people to figure out what certification is best for them no matter where they find themselves in their career. The organization came out of the Credential Transparency Initiative (CTI) which started back in 2013. While Credential Engine on its registry will list certifications in all fields – not just cybersecurity – their goal is to

    Dec 12,
  • Name: James Packer Title: Security and Cloud Specialist Employer: Big 4 Firm Location: London, UK Education: Information Technology and Security Years in IT: 10 Years in Cybersecurity: 5 Cybersecurity Certifications: CISSP, CCSP, CIS F ISO27001   How did you get in to a career in cybersecurity? I’d say I’m like countless security professionals out there, I first started in IT and security was just a part of my job, inherent in every role I performed. I started in desktop support, progressing through the service desk lines to a managerial role, before moving in to projects and architecture- “solutionising” as I call it. This was when security for me, upped a gear. As my career matured, I also started working for larger

    Dec 11,
  • When Uber’s massive data breach made it to the public’s ears recently, it became a member of an infamous group of companies who not only had vital customer data stolen, but who sat on the story and did not inform the public or the media until much later. The reasons for data breaches vary, but are heavily tinted by human errors and the presence of unprotected files or weaknesses on cloud servers. This is something that should make all cloud service providers (CSPs) sit up and take notice. Bad PR for one is bad PR for all.   The fact is, applications running in the cloud are not completely immune from breaches. Experts state clearly that IT teams need more robust

    Dec 07,
  • Name: Mario Damar BardowellTitle: Security AnalystEmployer: LeidosLocation: Orlando, Florida, U.S.A.Degree: B.S. in Network Systems CommunicationsYears in IT: 8Years in information security: 2Cybersecurity certifications: SSCP, CISSP, CompTIA’s CASP and Security +, CEH   How did you decide upon a career in cybersecurity? The decision to pursue a career in cybersecurity was made due to the impression I received when I got a chance to work with an information security professional in my very first role as a help desk analyst. The man was sharp and always did things by the book. He didn't cut corners and showed me why securing systems was critical to a business’s success. It was then that I knew I wanted to put my time and effort

    Dec 05,
  • Name: Marco FernandesTitle: Lead Security Solutions ArchitectEmployer: Hewlett Packard EnterpriseLocation: Dallas/Ft. Worth, Texas, U.S.A.Degree: Bachelor of Science in Business Computer Information SystemsYears in IT: 4Years in information security: 8Cybersecurity certifications: SSCP   How did you decide upon a career in cybersecurity? I grew up with a love of technology and cybersecurity, along with a curiosity for business. So when I got to college, I wasn’t sure what I should major in. My brilliant brother, Roger Fernandes, encouraged me to pursue a degree in Business Computer Information Systems (BCIS). After seeing news of so many hacks and data breaches, I knew our country needed more security professionals, thus I decided to become one. I started out as an IT analyst in

    Nov 22,