Top
Image Alt

Author: Jennifer Hanly

  /  Articles posted by Jennifer Hanly (Page 3)

Demand for cybersecurity talent is at an all-time high and continues to accelerate at a record pace. CISSP and CCSP certifications distinguish you among the most highly skilled cybersecurity specialists and open new opportunities for career advancement. Stand out with cybersecurity’s two top credentials     Most In-Demand - CISSP, regarded by organizations around the world as the premier certification, tops the list of security credentials required by employers at LinkedIn. Fastest Growing - CCSP, the fastest-growing (ISC)² certification and the hottest in cloud security, ranks No. 1 on Certification Magazine’s list of credentials

  Candidate, Associate or Member? Thinking of (ISC)² membership, but don’t know which level is right for you? Read on to find out more about the different ways in which you can join the global community of cybersecurity professionals who are shaping the future of the industry.     Why (ISC)² Membership? With over 150,000 members and associates in more than 175 countries, (ISC)² (International Information System Security Certification Consortium) comprise the largest global association of expert cybersecurity professionals dedicated to inspiring a safe and secure cyber world.  (ISC)² certifications are recognised as the gold

Attending a Cybersecurity event is an opportunity to get industry updates, meet peers, and learn more about new technologies. Taking the time to think through what it is you want to get out of your time at an event, and preparing can ensure that you achieve all that you had intended.   Trends/technologies - study the exhibitors list and decide what it is you want to see and where it is located. Mapping your route can save you time and steps and ensure you get to see all the exhibits you

If you have had suspicious looking texts about deliveries, you are not alone. There is very little you can do to stop them from pinging into your phone, but you can avoid becoming a victim.   What are they looking for? There are a number of issues that may occur from responding to these delivery text scam messages. They might be looking for your card details – generally these texts will tell you that you have a ‘fee’ to pay before the delivery can occur. Or these texts will be hoping you click

We have some top tips to stop you running in to any online shopping traps during the busy shopping period. The first piece of advice is to relax, don’t think that everything you do online is a trap, or someone trying to get something out of you.     Breathe This is probably the most important part of online shopping. Take a moment to breathe and assess the situation. Even if you are in work and under pressure to complete a transaction, it’s better to take that moment to check what you are doing

Following a full house at OWASP 2022 Global AppSec in San Francisco, Fabio Cerullo will be delivering a highly interactive session on Web Application Security Essentials at OWASP 2023 Global AppSec Dublin     This  training has been updated to align with the recent changes to the OWASP Top 10 2021 – the world-renowned reference document that details the most critical security risks to web applications. This ensures that the course provides the most up to date knowledge for attendees. The course provides the knowledge and resources required to evaluate the security of web

As the new year approaches it is interesting to speculate about how cybersecurity challenges and how they are addressed may change in 2023.     Deloitte reveals 10 strategic cybersecurity predictions for 2023 Board cybersecurity readiness will become business imperative Connected device visibility and security will be a major area of focus for most organizations Security in emerging technologies will be critical in their adoption Data-centric security and privacy will become imperative to building brand and customer trust Focus of future-forward readiness Organizational resilience will continue to be the focus Complex supply chain

Cybersecurity training is critical to developing essential skills and offering professionals the career paths they are looking for. Recruiting and retaining essential cybersecurity talent is challenging as the demand for candidates far outweighs supply. By prioritising training, organisations can build a team with the knowledge and expertise to defend themselves from cyberattacks and data breaches. For more than 15 years Cycubix has worked with clients to apply the latest knowledge and relevant skills to help protect their critical information. We have an in-depth understanding of the most current threat landscape, technologies

  In this article we look at the PCI DSS requirement for secure software development and why it is important, not just to achieve compliance, but to help prevent breaches and protect payment card information and other sensitive customer information.        NOTE - PCI DSS update from V3.2.1 to V4.0: Changes in version V4.0 relating to Training for Software Development Personnel The training of software developers elements (previously Requirement 6.5 in V3.2.1) have been updated and restructured under Requirement 6.2.2 in PCI DSS v4. These changes ensure that the standard continues to be current

The annual (ISC)² Cybersecurity Workforce Study assesses the size of the cybersecurity workforce, the demand for skilled individuals, and the shortfall in available talent. The 2022 (ISC)² Cybersecurity Workforce Study reveals that despite the number of cybersecurity professionals increasing, demand far exceeds supply and the workforce gap continues to grow. The study shows that the workforce has grown to 4.7 million, up 11% from a year ago, but the workforce gap has also increased - from 2.7 million to 3.4 million. The report provides insights for organisations on how they