Top
Image Alt

Author: Jennifer Hanly

  /  Articles posted by Jennifer Hanly

The annual ISC2 Cybersecurity Workforce Study surveyed 15,852 cyber security practitioners and decision makers to take capture the state of cybersecurity workforce and the cybersecurity skills gap. The report details the size of the workforce and the cybersecurity skills gap in meeting the demand for cybersecurity expertise. It also looks at the talent and the skills that organisations need, the wider economic context and the views of the professionals themselves. The result is a unique and thorough perspective on ecosystem that is responsible for protecting our digital world. Here are some of

Cyber Security Improvement Grant supports Irish small and medium companies to implement changes in their systems and practices to enhance their cybersecurity and help protect their businesses from cyberattacks. The grant is open to companies who have received a Cyber Security Report on completion of a Cyber Security Review. On completion of the Cyber Security Review, you can apply for the Cyber Security Improvement Grant. This grant from the NCSC-IE offers 80% funding, up to €60,000, to help companies in Ireland to implement the recommendations and address vulnerabilities identified in your

The Cyber Security Review Grant is the first of two grants launched by Enterprise Ireland and the National Cyber Security Centre (NCSC) to help Irish companies review and strengthen their security posture.  Make the Cyber Security Review Grant your first/next step towards growing your business and protecting it from cyber threats. Digital tools enhance businesses capabilities to build competitive advantage and drive growth. With digital transformation comes risk and it is crucial that organisations protect sensitive information and mitigate the risk of cyber-attacks. Companies in Ireland could save 80% off a €3,000 cyber

Mitigating injection attacks requires an approach that  incorporates secure coding practices at every stage of application development and deployment.  Web applications have transformed how consumers and businesses interact, offering enhanced speed, convenience, and user experience. However, these benefits also introduce significant risks, as the accessibility of web applications through browsers makes them prime targets for cyberattacks. The vulnerabilities in web applications can be exploited, potentially providing attackers with access to sensitive personal and financial data. According to the 2024 Verizon Data Breach Investigations Report, web applications held the top spot as

The NIS2 Directive takes a significant step towards enhancing cybersecurity across the European Union. Designed to address the evolving threat landscape and ensure a robust, unified approach to cybersecurity, the regulations impose stricter security requirements and reporting obligations on organisations that provide essential services and critical infrastructure . What is the NIS2 Directive?  The NIS2 Directive is a set of EU-wide cybersecurity requirements and regulations designed to increase the cybersecurity preparedness of EU member states. Organisations that provide essential services, digital service providers, suppliers of critical technologies, and public administration entities will

Building applications for an ever-changing threat landscape is critical and challenging. Join Fabio Cerullo at the ISC2 Security Congress in Las Vegas for a highly interactive Threat Modeling workshop and learn how to build resilient web applications. Threat Modeling Workshops are scheduled for the two days before ISC2 Security Congress 2024 officially opens – Saturday, October 12 and Sunday, October 13. The workshop combines theory review and a strong emphasis on practical exercises. Participants on the Threat Modeling Workshop will learn how to: Integrate threat modeling into the application development life cycle Apply

Web application vulnerabilities can be exploited to access critical and confidential data. Join Fabio Cerullo at OWASP 2024 Global AppSec San Francisco for a highly interactive session on Web Application Security Essentials Web applications play a key role in the success of an organisation, from streamlining business processes to creating online interactions that ensure a positive customer experience. However, web applications do allow access to critical and confidential resources. But, without understanding web application vulnerabilities and addressing them, organisations risk their data, their operations and their reputation. At OWASP 2024 Global

The demand for skilled cybersecurity professionals continues to grow in response to increased reliance on technology matched by a steady rise in cybercrime. The European Cybersecurity Skills Framework (ECSF) - developed by ENISA (The European Union Agency for Cybersecurity) establishes a common understanding of the roles, competencies, skills, and knowledge required in the cybersecurity field.   Why the European Cybersecurity Skills Framework is important The ECSF provides a structured approach to defining and recognising cybersecurity skills, helping individuals to effectively manage their professional development and career paths.  By aligning certification credentials with professional roles,

Companies rely on ISC2-certified professionals to prepare for and recover from cyberattacks. ISC2 certifications are recognised as the gold standard in the industry and demonstrate comprehensive and professional knowledge critical to developing and protecting systems and data.  With ISC2 certifications so highly regarded in the cybersecurity industry, there is no shortage of training companies that offer preparation for the ISC2 certification exam. Not all of these are affiliated with ISC2. It is important to know who you’re partnering with and understand the benefits of engaging an ISC2 Official Training Partner. As an

On September 15, 2024, ISC2 will update the Systems Security Certified Practitioner (SSCP) credential exam. These SSCP Domain updates are the result of the Job Task Analysis (JTA), which is an analysis of the current content of the credential evaluated by ISC2 members on a triennial cycle. A title change is occurring for Domain 1. Security Operations and Administration will have a new title of Security Concepts and Practices. Q: Why are changes being made to the SSCP exam? ISC2 has an obligation to its membership to maintain the relevancy of its credentials. These enhancements