(ISC)² Certified Cloud Security Professional (CCSP) – FAQ
Certified Cloud Security Professional (CCSP) certification Many cybersecurity professionals have questions about the Certified Cloud Security Professional CCSP certification – what it is, why should I consider it, what is involved and lots more. If you are thinking about becoming CCSP certified and are interested in learning more about the process and requirements, the Certified Cloud Security Professional CCSP - FAQ may give you some answers. If you do not find what you are looking for, please contact us and we would be delighted to answer your questions. What is the Certified
Top Five Cybersecurity Predictions for 2022
2021 was a challenging year for IT security professionals. As the pandemic continued the work-from-home movement extended with its associated cybersecurity risks. Ransomware attacks grew at record levels with some very high-profile attacks on critical infrastructure – all in the face of the ongoing shortage of IT security talent. In this webinar, Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), discusses his Top Five Cybersecurity Predictions for 2022. Top Five Cybersecurity Predictions for 2022 1. The Overall Volume of Successful Attacks Will Decline 2. IT Budgets Will Rebound (Slightly) 3. Quantity and
Cybersecurity ‘blind spot’ putting Irish companies at risk
The PwC 2022 Global Digital Trust Insights study has reported that more than 60 per cent of Irish businesses expect cybercrime to increase this year. One concern is the risk posed through suppliers and technology support networks - with more than half of Irish respondents anticipating an increase in breaches through their software supply chain. Another potential weak spot are cloud services, with 62 per cent of Irish respondents expecting attacks on such services to rise. With responses from over 3,600 participants, the study showed that only 29 per cent of Irish
Changes to OWASP Top 10 for 2021 – Web Application Security Training updated
The Open Web Application Security Project (OWASP) has made changes to the OWASP Top 10 for 2021. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. Since 2003, the OWASP Top 10 has become a world-renowned reference document that details the most critical security risks to web applications. These help organizations and developers to develop secure applications. The Top 10 is a baseline for compliance, education, and vendor tools. Changes to the OWASP Top 10 for 2021 The Top 10 includes
2021 (ISC)² Cybersecurity Workforce Study
According to the (ISC)² Cybersecurity Workforce Study, the global cybersecurity skills gap has decreased, from 3.1 million to 2.7 million people, reflecting a greater number of people joining the profession. The study also looks at cybersecurity salaries, top skills development priorities, and planned investments in people and technology. Job satisfaction among the professionals also increased with 77% of respondents satisfied or extremely satisfied with their jobs compared to 66% in 2019. Download the full study at: https://www.isc2.org/Research/Workforce-Study
Cycubix in the News – An Irish cybersecurity company to watch
Businesses across all verticals are facing greater challenges in managing and mitigating the impact of cyberattacks. Experience and expertise in cybersecurity is driving innovators to develop the solutions needed to enable businesses to protect their data, operations and their customers. Ireland has become recognised as a cybersecurity innovator and many international companies are based here. The unique expertise in Ireland is driving further to benefit from increased global investment. This article published on the Bank of Ireland's ThinkBusiness website showcases 26 leading Irish cybersecurity companies
Begin Your Cybersecurity Journey with the Digitalisation Voucher
The Enterprise Ireland Digitalisation Voucher is designed to build digital capabilities across Ireland. The voucher can cover up to 100% of the cost of a 10 day consultancy engagement (to a value of €9,000). Apply the Digitalisation Voucher for a review of cybersecurity risk and mitigation strategy. The voucher can be applied to work towards international security standards. Digital transformation enables businesses to build competitive advantage and drive growth. By adopting technologies such as cloud, internet of things (IoT) and big data, companies can increase productivity, improve efficiency, and enhance customer
How To Manage Phishing Attacks and High-Risk Users
So I spent the past week at the COSAC Security Conference and I’ve recharged my engagement batteries once again. One thing that I heard over and over in speaking with my colleagues there, was that we still haven’t cracked the password issue. With the enormous rise in phishing and other account takeover methods, the problem is quickly getting out of control (1). Fighting Phishing with Awareness and Two-Factor Authentication We at Cycubix have built a brand new Phishing awareness training module for our clients, but even though heightened awareness among users has
Cycubix Sponsors Cyber Ireland National Conference – (ISC)² Official Training Discount
Cycubix is delighted to sponsor the 1st annual Cyber Ireland National Conference (CINC) on the 21st of October 2021. This event brings the cyber security community together to discuss the challenges facing industry and the innovative solutions available from Ireland and internationally. Visit the Cyber Ireland National Conference website here: https://conference.cyberireland.ie Cycubix promotes the development of the cyber security ecosystem, and Ireland as a leader in this sector. We are passionate about education, and therefore convinced training and awareness play a fundamental role in a successful cyber security strategy. As an (ISC)²
Who Do You Want on Your Cybersecurity Team?
Key Considerations for Building your Cybersecurity Team * Follow up to June’s article “Cybersecurity Education and Training (the devil’s in the detail)”. For the past month or two, I’d been thinking about writing a piece to help organisations when they are developing a cybersecurity team and facing the task- “We need to hire a security person!” It sounds like an easy fix - right? Not so, I’m afraid. So what does a “security person” do? I’ve been working for over 30 years in “security” and the best answer I can come up with