certifications
How to Break Into a Cybersecurity Career – Phillip Wylie
Tom Eston | | Apple Podcasts, Author, Book Author, career, Careers, certifications, Cyber Security, Cybersecurity, cybersecurity certifications, Data Privacy, Digital Privacy, Episodes, hacker, Hacking, Information Security, Infosec, Learning, Origin Story, OSCP, penetration tester, Penetration Testing, Phillip Wylie, Phillip Wylie Show, Podcast, Podcaster, Podcasts, Privacy, Pro Wrestling, security, Spotify, Teaching, technology, The Hacker Factory, Weekly Edition
In this exciting episode of our podcast we have the pleasure of speaking with Phillip Wylie, a remarkable professional with a captivating career in cybersecurity. Join us as we discuss Phillip’s unique ...
Should You Trust Cybersecurity Certifications?
There’s a major discrepancy between the number of organizations that are investing in cybersecurity certification programs and the number that feel prepared for an attack, according to an Immersive Labs report. While ...
Security Boulevard
Forrester: Rethink Reliance on Professional Certifications
To many IT and security professionals, industry certifications are a necessary evil. Primarily due to common—yet increasingly questioned—hiring practices, certifications are vital for entry-level cybersecurity workers who need to establish a baseline ...
Security Boulevard
CISO Liability Risk and Jail Time, (ISC)2 Bylaw Vote and the Value of Cybersecurity Certifications
Tom Eston | | Bylaw Vote, Bylaws, certifications, CISO, CISSP, Cyber Security, Cybersecurity, cybersecurity certifications, Data Privacy, Digital Privacy, Down the Security Rabbithole Podcast, Episodes, Information Security, Infosec, ISC2, Liability Risk, Podcast, Privacy, Rafal Los, risk management, security, technology, Uber, Vote, Weekly Edition
Rafal Los, host of the popular Down the Security Rabbithole Podcast, joins us to discuss CISO liability risk and the ongoing discussion in the cybersecurity community about CISOs going to jail. Plus, ...
How Data Privacy Certifications Can Advance Your Career
Whether you’re a 20-year veteran employee or a new graduate looking to make it big, certifications can help you make significant leaps in your career trajectory. This is especially true for security ...
Security Boulevard
The Importance of Cybersecurity Standards and Certifications for SMBs
Tripwire Guest Authors | | certifications, Compliance, Connecting Security to the Business, Cybersecurity, security standards, standards
In today’s world with cyber attacks hitting the headlines daily, cybersecurity is at the forefront of many business owners’ minds, but implementing the right solutions and knowing what to do to reduce ...
Understanding the OWASP Top 10 Web Application Risks
Timothy Chiu, VP of Marketing | | Application Security, AppSec, certifications, Cloud, Cloud Security, Cyber Security, owasp, Uncategorized
The OWASP Top 10 Web Application Security Risks has become synonymous with web application security. Learn who OWASP is and where the top 10 list began and the other resources OWASP has ...
Getting IAST Results from DAST Testing
Timothy Chiu, VP of Marketing | | Application Security, AppSec, certifications, Cloud, Cloud Security, Cyber Security, Uncategorized
IAST is one of the latest buzzwords in security testing, and now required as part of the NIST SP800-53 Revision 5 security framework. Learn how to get IAST results using your existing ...
Hottest 11 Cybersecurity Certifications
Timothy Chiu, VP of Marketing | | Application Security, AppSec, certifications, Cloud, Cloud Security, Cyber Security, Uncategorized
If you're not busy during this pandemic and have been wondering how you can brush up on your resume to enhance your cybersecurity credentials, CRN has just the thing for you. CRN ...
New SHA-1 Attack
Bruce Schneier | | academicpapers, certifications, cryptography, encryption, forgery, impersonation, keys, pgp, sha1
There's a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We ...