Remove content research assessing-the-it-skills-gap
article thumbnail

Breaking Barriers, Building Bridges: Cultivating Female Belonging in the Cybersecurity Landscape

Jane Frankland

It was a desperate attempt to bridge the gap between understanding and empathy, to paint a vivid picture of the struggles women face. It was a desperate attempt to bridge the gap between understanding and empathy, to paint a vivid picture of the struggles women face. Research by Gavin D. It’s declined.

article thumbnail

International Women’s Day Spotlight: Laura Cabrera

Security Boulevard

Laura joined Onapsis six years ago as a developer and is now the Assess Squad owner on the Product Research Team. She is in charge of organizing the work the team does every sprint and works on defining content for the Onapsis product suite to keep SAP systems secure. . Q: How did you get started in tech/cybersecurity?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Cobalt Strike Became a Favorite Tool of Hackers

eSecurity Planet

Indeed, the tool can assess vulnerabilities and run penetration tests , while most tools on the market cannot do both. Vulnerability assessment and pentesting are two different things. A few weeks ago, security researchers found evidence of Cobalt Strike payloads in Microsoft SQL servers.

article thumbnail

The Checklist to Ensure the Ultimate SaaS Security Posture Management (SSPM)

IT Security Guru

Gartner created the SaaS Security Posture Management ( SSPM ) category for solutions that continuously assess security risk and manage the SaaS applications’ security posture. Skills gap in ever-evolving, accelerating, complex cloud security. Cloud security is the umbrella that holds within it: IaaS, PaaS and SaaS.

article thumbnail

New certificate program teaches cloud auditing in a multi-tenant architecture

SC Magazine

If you think you can audit your cloud-based IT infrastructure the exact same way that you assess security and privacy on a traditional on-premises network, you may be due for a reality check. While the objective may be the same, it’s a very different process that requires its own set of skills and knowledge.

article thumbnail

Cybersecurity threats: what awaits us in 2023?

SecureList

Knowing what the future holds can help with being prepared for emerging threats better. Every year, Kaspersky experts prepare forecasts for different industries, helping them to build a strong defense against any cybersecurity threats they might face in the foreseeable future. Also, we’d like to thank Prof.

article thumbnail

New MITRE ATT&CK certification course could boost framework’s adoption

SC Magazine

The MITRE ATT&CK Defender certification program offers courses in ATT&CK fundamentals, threat intelligence and SOC assessments. Future training courses could include case studies, “deep dives into techniques and maybe adversary engagement,” according to Steve Luke, director of content at MAD.

Media 64