Remove top-cybersecurity-certifications
article thumbnail

GUEST ESSAY: Why internal IT teams are ill-equipped to adequately address cyber risks

The Last Watchdog

Related: The case for augmented reality training Because of this, cybersecurity investments and regulatory oversight are increasing at an astounding rate , especially for those in the financial services industry, bringing an overwhelming feeling to chief compliance officers without dedicated security teams. The list goes on.

article thumbnail

Breaking Barriers, Building Bridges: Cultivating Female Belonging in the Cybersecurity Landscape

Jane Frankland

I knew it was a crazy act, and perhaps it was unfair of me to subject him to it, but I wanted him to understand a pressing need in cybersecurity. My intention was to physically manifest the dire state of gender diversity for cybersecurity; to make him truly feel the weight of it all. It’s declined. For example, Byrnes et al.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Awareness Month Blog Series: Leading the cybersecurity jobs of the future

Thales Cloud Protection & Licensing

This October marks the 15 th annual National Cybersecurity Awareness Month (NCSAM) – an initiative to raise awareness around the importance of cybersecurity. 8-12): Millions of Rewarding Jobs: Educating for a Career in Cybersecurity. 1-5): Make Your Home a Haven for Online Safety. Week 2 (Oct. Week 3 (Oct.

article thumbnail

GUEST ESSAY: Stolen logons, brute force hacking get used the most to breach web, email servers

The Last Watchdog

Web application attacks directed at organizations’ web and mail servers continue to take the lead in cybersecurity incidents. In the report’s findings, stolen credentials and exploited vulnerabilities are the top reasons for web breaches. This year, these were the top reasons for web breaches. Shifting exposures.

Hacking 201
article thumbnail

GUEST ESSAY: A call to blur the lines between cybersecurity training, up-skilling and higher ed

The Last Watchdog

In a recent survey of US-based CEOs, talent shortages and cybersecurity were listed as two of the top five business concerns in 2022. The bottom line: organizations with unfilled cybersecurity roles are leaving themselves vulnerable to the growing number of cyber threats. Today, there are more paths into cybersecurity than ever.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.) Erin: So, let’s get started.

article thumbnail

Attackers Continue to Leverage Signed Microsoft Drivers

eSecurity Planet

” And SentinelOne researchers pointed out that this wasn’t the first time Microsoft had dealt with this issue, writing, “In June 2021, GData published a blog on a malicious Netfilter rootkit signed through the same process.” Malicious driver signed by Microsoft.