How much can I make in cybersecurity?
Introduction: The cybersecurity job market Cybersecurity is a growing field, and with the shortage of specialists expected to grow and the prospect of up to 3.5 million unfilled job positions by... Go on to the site to read the full article ... Read More
How to turn your IT team into a security team
Introduction: IT teams vs. security teams Building a strong security team should be a priority for all organizations today. This includes companies that already have a good IT team on board made of... Go on to the site to read the full article ... Read More
Top 6 malware strains to watch out for in 2020
Introduction: The upsurge of malware Malware is a favorite way for cybercriminals to launch attacks. A number of malware types have made the news as responsible for data theft and high-profile... Go on to the site to read the full article ... Read More
Cybersecurity manager certifications compared: CIPM vs. CISM vs. GSLC vs. CISSP
Introduction: Management in the age of cybersecurity These days, no organization can run successfully without cybersecurity managers. In their oversight role, cybersecurity managers ensure staff... Go on to the site to read the full article ... Read More
How to work with HR or recruiters to improve your cybersecurity hiring strategy
Introduction: Is there a talent gap in your organization? With the IT security industry’s skills shortage and the high demand for advanced cybersecurity pros, finding those who possess the traits of... Go on to the site to read the full article ... Read More
Certifications compared: GCFA vs. CSFA vs. CCFP
Introduction: The importance of forensic analysts An increase in computer crimes is driving the need for more certified forensics analysts. These specialists have a crucial role in gathering... Go on to the site to read the full article ... Read More

Phishing techniques: Contest winner scam
Introduction: Phishing is evolving via bogus online ads and webmail Phishing scams are among the most serious and pervasive frauds operating today. One of the most used tactics is a scheme that has... Go on to the site to read the full article ... Read More

Phishing techniques: Expired password/account
Introduction Nowadays, a fair number of phishing attacks have been linked to expired password scams. This is a tactic used to steal identifying information and account access by luring users into... Go on to the site to read the full article ... Read More
CompTIA Linux+ XK0-004 – what changed with this cert and test?
Introduction: How Linux fits into an IT career It is becoming increasingly valuable for an IT professional to have advanced Linux skills, as employers are on the lookout for qualified open-source... Go on to the site to read the full article ... Read More
North America’s top IT security conferences in 2020
Introduction: Why attend conferences? This year will bring plenty of opportunities for professionals to attend conferences, getting them exposed to new products and tools showcased by companies... Go on to the site to read the full article ... Read More