How to use the NICE Cybersecurity Workforce Framework to plan career progression: A practitioners’ guide

Introduction: An overview of the NICE Cybersecurity Workforce Framework In 2017, the National Institute of Standards and Technology (NIST) published Special Publication 800-181, the NICE Cybersecurity Workforce Framework (or NICE Framework); the document categorizes and describes cybersecurity work as well as the knowledge, skills and abilities (KSAs) needed by professionals ... Read More

How to achieve CMMC levels 1 through 5

| | CMMC Level 1-5 Overview
Introduction: Where the DoD stands on cybersecurity certification The Department of Defense (DoD) has created the Cybersecurity Maturity Model Certification (CMMC) in an effort to secure the Defense... Go on to the site to read the full article ... Read More

National Counterintelligence and Security Center: 5 priorities for 2020

| | General Security
Introduction: NCSC’s role For years, the United States has faced increasingly aggressive and complex threats from foreign intelligence entities (FIEs) and nation-states, as well as from a range of... Go on to the site to read the full article ... Read More

What is the NICE Cybersecurity Workforce Framework?

Introduction: All about the NCWF The National Initiative for Cybersecurity Education (NICE), led by the National Institute of Standards and Technology (NIST), is a partnership between government,... Go on to the site to read the full article ... Read More

Spamdexing (SEO spam malware)

| | Malware Analysis
Introduction: About SEO spam — is my website a target? You’ve spent time and energy in positioning your website high in search engine rankings through good SEO practices. You realize, however, that... Go on to the site to read the full article ... Read More

Cybersecurity consultant certifications — Explore your options

Introduction: IT consultants for cybersecurity matters Cybersecurity consultants are the go-to professionals to devise best ways to protect an organization’s critical assets. Their role entails... Go on to the site to read the full article ... Read More

How to get promoted in a cybersecurity career

Introduction: What the cybersecurity talent market looks like at the moment Are you considering a career in cybersecurity? If so, this is actually a great time to be in the field, especially with an... Go on to the site to read the full article ... Read More

Top eight podcasts episodes and webinars on closing the skills gap and starting a cybersecurity career

| | General Security
Introduction: Expert-led digital audio and video files grow in popularity These days, employers are facing millions of unfilled IT security positions and a shortage of talented workers. In fact,... Go on to the site to read the full article ... Read More

Should you phish-test your remote workforce?

| | Phishing
Introduction: New wave of phishing When the novel coronavirus pandemic began, it caused more than a medical emergency and lockdowns. Like many events before, it also caused an increase in phishing.... Go on to the site to read the full article ... Read More

Certifications compared: Linux+ vs RHCSA/RHCE

Introduction: Linux talent most sought-after by employers In the past couple of years, there has been a growing demand for open source skills in order to fill shortage gaps. According to the 2018... Go on to the site to read the full article ... Read More