If you’re looking to break into the field of cybersecurity – and workforce research shows, we need you to join us – (ISC)²’s SSCP certification may be the way to go. Certification Magazine recently wrote about the SSCP certification as a solid point of entry for aspiring security professionals. The certification is ideal for those in “boots on the ground” positions within security operations. The SSCP exam is highly technical and focused on hands-on knowledge skills. The certification is ideal for security analysts, systems engineers, database administrators and others responsible for the day-to-day operations of securing their organizations critical assets. For more information about the SSCP certification – including exam information, steps to getting certified and the benefits of membership
- Nov 06,
Patrick Strijkers is a 43-year-old information risk security officer at a pension funds firm in the Netherlands. He works in the IT security department in security incident management. Patrick’s employer runs a job rotation program, allowing him to gain experience in a variety of roles, with his next position coming invulnerability management this September. He holds the following security certifications: CompTIA Security+ CompTIA Network+ EC-Council Certified Ethical Hacker v8 EC-Council Certified Security Analyst v8 EC-Council Computer Hacking Forensics Investigator v8 Rapid7 Nexpose Rapid7 Metasploit Pro Patrick’s goal last year was to earn his CISSP certification. He attended a five-day boot camp course and studied for two and a half months before sitting for his exam on August 11 of 2017.
Aug 07,By Ravindra Krishna, CISSP In a recent Operational Technology (OT) cyberattack, Monero Crypto-currency mining malware was discovered in the ICS network of a water utility company located in Europe. The company found the malware during a routine monitoring check of their OT network and confirmed that the malware infected five servers including the Human machine interface (HMI), which is used to control and manage physical components of OT networks. This attack provides further evidence that OT networks are not simply vulnerable, but actually easy targets. The Post-Stuxnet OT Cyberattack Era I believe that we can divide OT attacks into two eras: before Stuxnet and post-Stuxnet. The infamous worm was a fully loaded weapon completely made of code. The first source
Jul 03,As investments in public cloud computing continue to grow, so do cloud-related security incidents. Over the past 12 months, 18 percent of organizations have experienced a cloud security incident, double the number reported in the previous 12-month period, according to a recent report. Not surprisingly, concerns over cloud security also are rising, with more than nine out of 10 cybersecurity professionals – 91 percent, to be exact – saying they are worried about it. This, too, represents an increase from the previous polling period, when 81 percent of cybersecurity professionals expressed similar fears, and reverses a multiple-year downward trend. The findings are part of the Crowd Research Partners’ 2018 Cloud Security Report, based on a comprehensive online survey of more than
May 21,Name: Kreesan Govender Title: Information Security Risk and Compliance SpecialistEmployer: MiWay Insurance (Santam Group)Location: Johannesburg, South AfricaEducation: National Diploma Computer Network EngineeringYears in IT: 5Years in Cybersecurity: 4Cybersecurity certifications: SSCP How did you decide upon a career in cybersecurity? I have always found hacking and data breaches interesting since my days at campus, and when I was given the opportunity to start my career within the cybersecurity field, I jumped at the opportunity. Since starting my career in cybersecurity, I have enjoyed every bit and have never looked back. How did you decide to pursue your SSCP? I was fortunate enough to be mentored by my previous manager Mr. Stanley Langa, who introduced me to (ISC)² and the SSCP certification,
May 14,