HackDig : Dig high-quality web security articles

The Top 10 Highest Paying Jobs in Information Security – Part 1

Want a job in cybersecurity? There are plenty to go around. Cybersecurity Ventures estimated that there will be 3.5 million job openings in the industry by the end of the year. That makes sense. According to Gartner, global spending on information security and risk management technology is expected to exceed $150 billion in 2021. Organizations are going to n
Publish At:2021-08-17 06:45 | Read:323 | Comments:0 | Tags:Featured Articles Off Topic Information Security Infosec job

The Death Star’s Demise: Can You Trust Your IoT Vendors?

It was 1977, and soon-to-be-fans were greeted with a masterful score and scrolling text. Darth Vader and Princess Leia share the screen in those opening moments, and the Star Wars universe was created.Nearly 30 years later, a new film would introduce us to the events immediately preceding the “scene that launched a franchise,” but how did things get to be th
Publish At:2021-05-04 07:17 | Read:639 | Comments:0 | Tags:Off Topic IoT Network Star Wars

VERT at the Movies: Cybergeddon

While I was teaching, one of my students asked if I had seen Cybergeddon, a film distributed by Yahoo! in 2012. I had not, so I decided it would be fun for VERT to watch the film and review it, since my hobby is writing film reviews for RotundReviews.Cybergeddon is not talked about as much as it should be given some of the background around it. It should be
Publish At:2021-02-17 03:20 | Read:943 | Comments:0 | Tags:Off Topic Cybergeddon Movie Review cyber

11 Respected Providers of IT Security Training

We at The State of Security are committed to helping aspiring information security professionals to reach their full potential. Towards that end, we compiled a two–part list of the top 10 highest paying jobs in the industry. Back in 2017, we even highlighted the U.S. cities that rewarded security personnel with the best salaries, amenities and other be
Publish At:2021-02-01 09:02 | Read:1088 | Comments:0 | Tags:Off Topic Information Security IT Security Skills security

Lessons from Teaching Cybersecurity: Week 13

As I mentioned previously, this year, I’m going back to school. Not to take classes but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python course
Publish At:2020-12-30 09:20 | Read:1229 | Comments:0 | Tags:Off Topic higher education lessons learned teaching security

Lessons from Teaching Cybersecurity: Week 12

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python ai
Publish At:2020-12-23 13:32 | Read:886 | Comments:0 | Tags:Off Topic Education grades lessons learned security cyber cy

Lessons from Teaching Cybersecurity: Week 11

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python co
Publish At:2020-12-15 02:44 | Read:1046 | Comments:0 | Tags:Off Topic Healthcare human resources welfare security cyber

National Poetry Month – Cybersecurity Edition

April is National Poetry Month, a time when we can celebrate poets and their craft. To join in the celebrations, we at the State of Security asked employees at Tripwire and in the wider infosec community to create and share some of their favorite cybersecurity-related poems with us.Here are some of our favorites from Twitter:Did you know April is #NationalPo
Publish At:2020-05-03 08:04 | Read:1611 | Comments:0 | Tags:Off Topic cybersecurity Infosec Poems

Why It’s Important to Have a Customer Community in the World of Cybersecurity

In an ever-evolving security world, we to need to secure more with even fewer resources. While the cybersecurity skills gap increases, leaving “350,000 U.S. cybersecurity jobs unfilled yearly,” it is vital to work together to protect our environments and educate others. Creating a customer community can do just that. Having a digital space with l
Publish At:2020-03-06 03:26 | Read:2227 | Comments:0 | Tags:Off Topic customer cybersecurity skills gap

Immutable Integrity? – Blockchain Beyond the Bluster

Sometimes you could be forgiven for thinking that the incessant overuse of the word ‘disruptive’ these days could do with some, well, disrupting of its own. So much is written, presented and marketed around apparently ‘disruptive’ use of technologies like AI, IoT and of course blockchain, when much of it could perhaps be better described as foundation innova
Publish At:2017-04-03 10:15 | Read:10320 | Comments:0 | Tags:Off Topic blockchain data security

Ultra Secret Chat Using Wi-Fi Covert Channel

“Covert Channel [Wikipedia]: a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy.”Today, in a world where the hacking techniques are getting more and more sophisticated and security meas
Publish At:2017-03-28 06:40 | Read:5186 | Comments:0 | Tags:Off Topic BSides Munich security Wi-Fi

Stop the Most Advanced Adversaries

Imagine that you are operating on an old XP, Win98 or Windows Server 2003 system. The system is out-of-support and vulnerable to a raft of possible exploits.However, it would be too disruptive to operations to update these systems since they’re running critical applications and processes. And even if you do upgrade to the latest versions, the list of new exp
Publish At:2017-03-22 03:20 | Read:9117 | Comments:0 | Tags:Featured Articles Off Topic Insider malicious security

10 Must-Read Books for Information Security Professionals

There are many ways for IT professionals to broaden their knowledge of information security. Attending infosec conferences, for instance, provides personnel with an opportunity to complete in-person trainings and network with like-minded individuals. Outside of industry events, analysts can pick up a book that explores a specific topic of information securit
Publish At:2017-03-16 18:05 | Read:7286 | Comments:0 | Tags:Off Topic books Information Security IT

Justifying the Value of Conference Attendance to Your Boss

Over the weekend, I became immersed in a discussion on Twitter centered around getting more people involved in InfoSec conferences. Here’s the original post by @hacks4pancakes:Lesley’s initial point led to many great responses relating to the value of attending conferences and the process of communicating that value to the powers that be within your organiza
Publish At:2017-03-15 23:30 | Read:6331 | Comments:0 | Tags:Off Topic Conference Infosec networking

Is Fileless Malware Really Fileless?

Over the past few weeks I have been seeing quite a few news articles around fileless malware infecting companies around the world. The article from Ars Technica specifically states that the goal of fileless malware is to reside in memory in order to remain nearly invisible. Besides residing in memory, the second aspect of fileless malware is the usage of wid
Publish At:2017-03-15 05:05 | Read:5516 | Comments:0 | Tags:Off Topic Indicators of Compromise Lan malware

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud