Careers
New Phishing Campaign Delivers Remote Access Trojans (RATs)
Nik Hewitt | | Best Practices, lateral movement, next gen security, Phishing, security, Security Research, Security Training, zero trust
Sophisticated phishing campaign leverages public services, where remote access Trojans are being delivered via malicious Java downloader A new phishing campaign has surfaced this week which cleverly employs a Java-based downloader to ...
ITRC Finds Online Job Scams on the Rise
The ITRC reported a surge in online job scams targeting unsuspecting job seekers for their personal information ...
Security Boulevard
Building security training for developers in 2024: Is it really worth it and how to proceed?
Discover the value of developer security training in 2024 and effective strategies for fostering a secure software development culture ...
Developers and security training: can they co-exist?⎜Laura Bell Main
Today, we’re excited to have an amazing guest, Laura Bell Main, join us. Discover with us: Can developers and security training really co-exist? ...
Lost to the Highest Bidder: The Economics of Cybersecurity Staffing
When it comes to cybersecurity talent, supply and demand economics are amplified far beyond what is experienced in other fields ...
Security Boulevard
Project assurance skills and Prince 2 for IT auditors
The challenge of IT Project AssuranceProject assurance can be a challenge; change programmes are notoriously complicated with many dependent parts contributing to an overall goal. Project managers often have a different view ...
Jason Haddix on Bug Bounties and Cybersecurity Career Growth
Tom Eston | | Arcanum Information Security, Bug Bounties, bug bounty, career, career growth, Cyber Security, Cybersecurity, cybersecurity career, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Jason Haddix, jobs, mentors, Mentorship, Podcast, Podcasts, Privacy, security, technology, Weekly Edition
In episode 316, we have the pleasure to chat with Jason Haddix, a prominent influencer in the cybersecurity community. With an intriguing career path, from being a ‘computer kid’, venturing into the ...
Should I get CISSP Certified?
The focus of CISSP is purely Information Security. Having said that, its a very big field. CISSP’s reputation as a certification is for being ‘a mile wide and an inch deep’. In ...
Should I get CISM Certified?
The Certified Information Systems Manager (CISM) qualification is provided by ISACA, and roughly on a par with it’s CISA IT audit qualification.It is a certification for IT security managers, and like CISA ...
Should I get CISA Certified?
CISA is possibly the one ‘pure’ Information systems audit qualification that is recognised anywhere. It is balanced between technical IT knowledge and business understanding. And it has lovely exam questions - and ...