article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Director, Industry Solutions Americas Solutions Architecture & Customer Success. Elizabeth has been with AWS for 5-1/2 years and leads Industry Solutions within the Americas Solutions Architecture and Customer Success organization. Elizabeth Moon. Amazon Web Services. Source: [link].

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

The certification covers active defense, defense in depth, access control, cryptography, defensible network architecture and network security, incident handling and response, vulnerability scanning and penetration testing, security policy, IT risk management, virtualization and cloud security , and Windows and Linux security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Are the Best Cybersecurity Certifications in 2023?

SecureWorld News

These online courses are provided by top educational platforms such as Udemy, Coursera, and Cybrary, leading U.S. The course will revolve around real-world system architectures, the threats and exploits that could result in a data breach , and the defense mechanisms that could be employed to protect a network.

article thumbnail

Real Talk with CCSPs: An Interview with Panagiotis Soulos

CyberSecurity Insiders

I was working in a system administrator capacity at the bank, and I wanted to know more about cybersecurity and follow the part of my master’s degree. We are involved with diverse populations, and that is very significant and educational as well. Q: What prompted you to decide to focus more on the security aspects?

article thumbnail

Just What Does It Take to Develop a Career in the Cybersecurity Domain?

IT Security Guru

You can explore your options through online education platforms such as PluralSight , Cybrary , and PentesterAcademy. System Administrator (or, sysadmin). Security Architecture. What kind of specializations are available? Specialization is a rabbit hole topic that we might not be able to cover in detail in this post.

article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

Applications have become more complex, their architecture better. To top it off, cybercriminals make use of legitimate services that are meant to help system administrators, such as PSexec, which allows remote execution of programs. Vulnerabilities market got a remake.

article thumbnail

IT threat evolution Q2 2021

SecureList

Our telemetry indicates that dozens of organizations were affected, belonging to the government or military sector, or otherwise related to the health, diplomacy, education or political verticals. This lays the foundation for Apple to switch completely to its own processors and unify its software under a single architecture.