Syndicated News

No Limits, No Excuses: Commit to Certification in 2020

Why are goal-oriented individuals more likely to thrive professionally? Because they know where they want to go. But accomplishing anything meaningful takes drive and dedication. Most of all, it requires a clearly defined plan and inspiration to stay on track. A milestone like achieving (ISC)2 certification is a powerful motivator, especially when you consider the rewards that come with it. Was 2019 the year you wanted to earn an (ISC)2 credential to enter a high-demand field, enhance your cybersecurity skills or increase job security? Perhaps you even started preparing, but got sidetracked by life’s demands. We really do get it……

Positively Impacting the Next Generation with Cyber Safety Day

As use of the internet becomes more acceptable in schools and expected at younger ages, cyber safety education is a necessity. While tablets, computers and smart devices are the norm at home and school for children, many students are not taught about the potential dangers faced while using technology. Shockingly, 40% of students in fourth through eighth grades have chatted with a stranger online, of those, 53% gave out their phone number to the stranger and 11% met with a stranger according to Children’s Internet Usage Study. Statistics like these are the impetus behind the mission of the Center for…

Wanted: Cloud Security Skills

As demand for cloud computing grows, so does the need to secure it. In a survey of its Technology Executive Council members, CNBC found that cloud and software-defined security are among the C-suite’s top technology strategies for 2020. As reported in this video, cloud computing tops the list, and it’s followed by machine learning, artificial intelligence and software-defined security. The CNBC Technology Executive Council has nearly 150 executives in various industries, 70% of whom participated in the survey. The survey shows that securing cloud environments is a major priority – not only for the C-suite but also for cybersecurity workers….

Open Source & Secure Software Development Are Not Mutually Exclusive

By Dr. Thomas P. Scanlon, CISSP Software Engineering Institute, Carnegie Mellon University Today’s software developers are as much integrators as they are pure coders. There is an abundance of libraries, plug-ins and other third-party software components readily available to speed development. There is no sense in reinventing something when you can just download it, merge it in and move along. Using free and open source software (FOSS) components can save both time and money, so they make for attractive choices. However, including open source software into development projects often makes the cybersecurity professionals in an organization a little uneasy. But,…

Switching from Other Fields to Cybersecurity Is Profitable

Here’s a bit of good news for anyone contemplating a career in cybersecurity: Cybersecurity workers who started their careers in other fields tend to get paid more than career-long cybersecurity professionals, according to new research. As reported by Security Boulevard, a survey conducted by Cynet, which makes breach detection tools, reveals that cybersecurity professionals with equivalent experience earn about the same regardless of whether they have a degree in computer science or a related engineering field. But those who started their careers outside of cybersecurity command higher salaries, a strong indication that employers – in the face of a skills…

Most Employers Don’t Pay Full Cost of Certifications

One of the most common complaints cybersecurity professionals voice about their employers is that they have to pay for certifications out of their own pockets. It’s not a trivial issue, since workers consider certifications their number one career hurdle, according the (ISC)2 Cybersecurity Workforce Study 2019. Based on study findings, most employers don’t pay their cybersecurity workers’ certification fees. Considerably fewer than half of respondents in the study (37%) say their employers pay for them while 21% say they share the cost with employers. More than one third of respondents (35%) pay for all of their own cybersecurity certification costs….

So You Have Decided to Become Cyber Security Certified, Now What?

By Tony Vizza, CISSP, CCSP, Director for Cyber Security Advocacy – APAC at (ISC)² Toward the end of 2019, I met many aspiring women and men who approached me and said, “Tony, I want to become cyber security certified, how do I do it?” If you are reading this article, it is likely that you have made a conscious decision to do so. Congratulations on taking this step in furthering your career, skills and knowledge. You have made the decision to demonstrate to the wider world your hard-gained experience, knowledge and skills in cybersecurity and to prove to yourself that…

New York’s New Data Breach Security Laws Increase Data Privacy and Provide Security Controls Guidance

By Paul Lanois, SSCP, CIPP, CIPT, CIPM and Eric Tieling, CISSP, CIPP/E The landscape of privacy and related legislation in the United States continues to get more interesting. Despite the California Consumer Privacy Act (CCPA) being the talk of the town for privacy and security professionals, New York also put something noteworthy in place, called the “Stop Hacks and Improve Electronic Data Security Act,” or SHIELD Act, in short. Not only is it relatively prescriptive, but it also encompasses cybersecurity obligations that are particularly relevant for security professionals. The SHIELD Act of New York was signed into law in July…

2019’s Top 10 Webcasts

Continuing education allows cybersecurity professionals to stay in tune to the constant changes in the industry. (ISC)² provides webcasts throughout the year on various security-related topics to help keep you informed, as well as provide opportunities to earn CPEs. Based on ratings by cybersecurity professionals, here are our top 10 webcasts from 2019: Ransomware Tools Continue to Increase Ransomware continues to be a widespread problem for organizations. Defending against such attacks are paramount for security teams at businesses small and large. Hear about the latest information concerning many of the leading ransomware threats, as well as updates on the state…

How Culture Makes Us Safer

As published in the September/October 2019 edition of InfoSecurity Professional Magazine By Wesley Simpson, COO There’s an untapped resource hiding in security departments that many of us may consider an intangible or even undefinable asset. When strengthened, it can have a drastic effect on an organization’s security and contribute to its overall value stream. I’m talking about building a strong culture within your cybersecurity team. There are some very tangible practices you can deploy within your team that can have a huge impact on engagement and satisfaction and make your business more secure at the same time. One way to…