Cybersecurity engineer resume tips
The role of cybersecurity engineer The role of the cybersecurity engineer has been around for decades. During that time, it has evolved dramatically. First, responsibilities mostly existed within... Go on to the site to read the full article ... Read More
Cybersecurity analyst resume tips
Introduction The role of a security analyst ranges from entry-level positions within a security operations center to senior, specialized roles within incident response teams. The first step in the... Go on to the site to read the full article ... Read More
5 Key Cloud Security Use Cases
A use case typically describes a situation where and how a system, product or service can be used. This is usually a short list of steps an actor should take in order to reach a goal. The concept of... Go on to the site to read the full article ... Read More
Deep Packet Inspection in the Cloud
When looking at network traffic in a very simplified way, network packets are made up of headers and data (or code). While the headers are mostly used to direct the traffic to the right destination... Go on to the site to read the full article ... Read More
Honeypots in the Cloud
Why Use Honeypots? For an organization that has a reasonably complete security posture, including a mature threat intelligence capability, the implementation of a so-called “honeypot” should be... Go on to the site to read the full article ... Read More
Developments Around Cloud TAP Capability
Whether it’s for troubleshooting or for security monitoring purposes, being able to capture network packets from inside a network at strategic points is invaluable. Think, for instance, of users... Go on to the site to read the full article ... Read More
The Cloud Browser
Discussions around personal privacy are becoming louder and more complicated, while many countries are trying to get a grip on social networks and on the challenges presented by encrypted Web... Go on to the site to read the full article ... Read More
Cloud Based IDS and IPS Solutions [Updated 2018]
Defense-In-Depth is a term used to describe the practice of creating a multi-layered defense system within a network. Each layer should be covered by one or more different security controls. This... Go on to the site to read the full article ... Read More
The Value of Online Malware Collections
The Problem with Malware One of the biggest security threats to a modern business is a malware outbreak. The risk of its occurrence is fairly high, thanks to the prevalence of malware-spam... Go on to the site to read the full article ... Read More
Using Cloud Infrastructure to Gain Privacy and Anonymity
Why would a security professional need anonymity? Anonymity and the need for privacy are often associated with suspicious or even criminal activity. For instance, in the Cyber Security sector, one of... Go on to the site to read the full article ... Read More