How much can I make in cybersecurity?

Introduction: The cybersecurity job market Cybersecurity is a growing field, and with the shortage of specialists expected to grow and the prospect of up to 3.5 million unfilled job positions by... Go on to the site to read the full article ... Read More

How to turn your IT team into a security team

Introduction: IT teams vs. security teams Building a strong security team should be a priority for all organizations today. This includes companies that already have a good IT team on board made of... Go on to the site to read the full article ... Read More

Top 6 malware strains to watch out for in 2020

Introduction: The upsurge of malware Malware is a favorite way for cybercriminals to launch attacks. A number of malware types have made the news as responsible for data theft and high-profile... Go on to the site to read the full article ... Read More

Cybersecurity manager certifications compared: CIPM vs. CISM vs. GSLC vs. CISSP

Introduction: Management in the age of cybersecurity These days, no organization can run successfully without cybersecurity managers. In their oversight role, cybersecurity managers ensure staff... Go on to the site to read the full article ... Read More

How to work with HR or recruiters to improve your cybersecurity hiring strategy

Introduction: Is there a talent gap in your organization? With the IT security industry’s skills shortage and the high demand for advanced cybersecurity pros, finding those who possess the traits of... Go on to the site to read the full article ... Read More

Certifications compared: GCFA vs. CSFA vs. CCFP

| | General Security
Introduction: The importance of forensic analysts An increase in computer crimes is driving the need for more certified forensics analysts. These specialists have a crucial role in gathering... Go on to the site to read the full article ... Read More
Phishing techniques: Contest winner scam

Phishing techniques: Contest winner scam

| | Phishing
Introduction: Phishing is evolving via bogus online ads and webmail Phishing scams are among the most serious and pervasive frauds operating today. One of the most used tactics is a scheme that has... Go on to the site to read the full article ... Read More
Phishing techniques: Expired password/account

Phishing techniques: Expired password/account

| | Phishing
Introduction Nowadays, a fair number of phishing attacks have been linked to expired password scams. This is a tactic used to steal identifying information and account access by luring users into... Go on to the site to read the full article ... Read More

CompTIA Linux+ XK0-004 – what changed with this cert and test?

| | General Security
Introduction: How Linux fits into an IT career It is becoming increasingly valuable for an IT professional to have advanced Linux skills, as employers are on the lookout for qualified open-source... Go on to the site to read the full article ... Read More

North America’s top IT security conferences in 2020

| | General Security
Introduction: Why attend conferences? This year will bring plenty of opportunities for professionals to attend conferences, getting them exposed to new products and tools showcased by companies... Go on to the site to read the full article ... Read More

Secure Guardrails