Tag: jobs
-
TDL 002 – Defending the DNS: How Quad9 Protects the Internet with John Todd
Tags: access, apple, attack, business, china, ciso, communications, control, country, crime, cyber, cybersecurity, data, defense, dns, email, encryption, firewall, google, ibm, india, infrastructure, intelligence, Internet, jobs, law, malicious, malware, network, phishing, privacy, service, strategy, technology, threat, tool, zero-trustSummary The Defender’s Log episode features John Todd from Quad9, discussing their mission to protect the internet through secure DNS. Quad9, a non-profit launched in 2017 with founding partners Global Cyber Alliance, Packet Clearing House, and IBM, provides a free, global recursive DNS resolver that blocks malicious domains. Todd emphasizes that Quad9’s success is a…
-
CISSP certification: Requirements, training, exam, and cost
Tags: access, business, china, ciso, cloud, computer, credentials, cybersecurity, government, guide, infosec, jobs, linkedin, network, risk, risk-management, skills, trainingWho should get a CISSP?: CISSP has been called the “gold standard” of security certifications. “From the hiring side, the CISSP remains one of the most valued certifications I look for,” says Ankit Gupta, Senior Security Engineer at Exeter Finance. “It shows a candidate has a firm grasp of security principles across multiple domains, and…
-
Moscow reportedly hires hackers who breached city’s school system
A senior Moscow official said the city hired several hackers who previously launched a cyberattack against the capital’s digital education platform. First seen on therecord.media Jump to article: therecord.media/moscow-hires-hackers-breached-education
-
Women cyber leaders are on the rise, and paying it forward
Tags: ciso, cloud, cyber, cybersecurity, data, defense, finance, google, group, insurance, international, jobs, lessons-learned, network, office, privacy, risk, service, skills, software, strategy, supply-chain, technologyCarol Lee Hobson, CISO, PayNearMe PayNearMeStill, companies could be doing more to bring women into cybersecurity positions, says Lauren Winchester, vice president of cyber risk services at Travelers.”Women make up more than half of the population yet represent roughly 20% of the cybersecurity workforce. While the number of women in cyber has increased over the…
-
Task Scams: Trend Micro warnt vor digitalem Job-Betrug
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/task-scams-trend-micro-warnung-digital-job-betrug
-
2025 CSO Hall of Fame: George Finney on decryption risks, AI, and the CISO’s growing clout
Tags: ai, attack, automation, breach, business, ciso, computing, conference, cyber, cybersecurity, data, encryption, intelligence, jobs, LLM, microsoft, risk, soc, threat, tool, zero-trustWhat do you see as the biggest cybersecurity challenges for the next generation of CISOs, and how should they prepare? : George Finney: One major challenge is the threat of attackers saving encrypted data today with the intention of decrypting it later. With quantum computing, we know that in five to 10 years, older encryption…
-
CCSP certification: Exam, cost, requirements, training, salary
Tags: access, application-security, best-practice, china, cloud, compliance, computer, credentials, cybersecurity, data, governance, infosec, infrastructure, jobs, risk, skills, training, usaCCSP vs. CISSP: ISC2 also offers the Certified Information Systems Security Professional (CISSP) certification aimed at upper-level security pros with industry experience. The biggest difference between these two certifications is that the CISSP exam draws from a much broader and more general pool of security knowledge, as it is meant to show that you can design,…
-
The CISO succession crisis: why companies have no plan and how to change that
The technical-to-strategic divide: One major obstacle keeping many mid-level security pros from becoming CISOs isn’t their tech skills, it’s learning to shift from doing hands-on security work to acting as strategic business partners. That change takes a whole new set of skills and a different way of thinking.”I think you see this with a lot…
-
TDL001 – Cybersecurity Explained: Privacy, Threats, and the Future – Chester Wisniewski
Tags: access, ai, attack, backdoor, breach, business, ciso, computer, country, crime, crimes, cyber, cybercrime, cybersecurity, data-breach, defense, detection, edr, email, finance, firewall, gartner, government, guide, hacker, hacking, Hardware, infosec, Internet, jobs, linkedin, mail, malicious, microsoft, military, monitoring, network, password, phishing, phone, privacy, programming, ransomware, risk, russia, scam, skills, software, sophos, spam, sql, strategy, switch, technology, threat, update, virus, vulnerability, wifi, windowsSummary “The Defenders Log” Episode 1 features host David Redekop and guest Chet Wisniewski discussing the dynamic world of cybersecurity. Wisniewski, with decades of experience, traces his journey from early BBS and phone network exploration to becoming a cybersecurity expert. They delve into the evolution of hacking, the emergence of profitable cybercrime like email spam,…
-
US sanctions fraud network used by North Korean ‘remote IT workers’ to seek jobs and steal money
Treasury officials say the North Korea government used the fraud network to generate money for the regime’s nuclear weapons program. First seen on techcrunch.com Jump to article: techcrunch.com/2025/08/27/us-sanctions-fraud-network-used-by-north-korea-to-seek-jobs-and-steal-money/
-
TDL003 – Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen
Tags: access, ai, apple, attack, backup, banking, browser, business, ceo, chrome, ciso, compliance, computer, computing, control, country, credentials, cybersecurity, data, data-breach, ddos, dns, encryption, endpoint, google, government, group, international, Internet, jobs, law, microsoft, mobile, network, phishing, phone, privacy, programming, radius, risk, service, smishing, strategy, switch, technology, threat, update, vpn, windows, zero-trustSummary This episode of the Defender’s Log features special guest Tommy Jensen, an internet technologist specializing in IPv6, Zero Trust, and standards. Jensen’s career path, from an AppleCare contractor to a key figure in advancing internet technologies, is explored. The discussion highlights the critical importance and challenges of migrating to IPv6 and the necessity of…
-
Vorsicht vor digitalem Job-Betrug durch ‘Task Scams”
Ein aktueller Bericht des IT-Sicherheitsunternehmens Trend Micro zeigt, wie ein neuartiger Online-Betrug weltweit rasant an Bedeutung gewinnt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cloud-security/digitaler-job-betrug-task-scams
-
Vorsicht vor digitalem Job-Betrug durch ‘Task Scams”
Ein aktueller Bericht des IT-Sicherheitsunternehmens Trend Micro zeigt, wie ein neuartiger Online-Betrug weltweit rasant an Bedeutung gewinnt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cloud-security/digitaler-job-betrug-task-scams
-
Break Into Cybersecurity with 38 Hours of Training, Now Less Than $25 for Life
Build job-ready cybersecurity skills with 38 hours of self-paced training from this lifetime bundle. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/cybersecurity-career-foundations-bundle/
-
Behind the Coinbase breach: Bribery emerges as enterprise threat
Coinbase’s widely praised incident response: Coinbase’s transparency, firm stance against the ransom, quick remediation, and willingness to compensate its customers earned wide praise from cybersecurity professionals.According to Coinbase’s Martin, the hackers resorted to paying help desk workers in India precisely because the company had built such a robust security program. Bribery, according to Martin, was…
-
Shadow AI is surging, getting AI adoption right is your best defense
Why most organizations fail at phase one: Despite the clarity of this progression, many organizations struggle to begin. One of the most common reasons is poor platform selection. Either no tool is made available, or the wrong class of tool is introduced. Sometimes what is offered is too narrow, designed for one function or team.…
-
33% Less Bot Traffic Lower Costs: How Wellfound Gains Time Tranquility with DataDome
Discover how Wellfound cut 33% of bot traffic and reduced infrastructure costs with DataDome’s AI-powered bot protection. Learn how proactive security, time savings, and expert support help safeguard job data and deliver peace of mind. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/33-less-bot-traffic-lower-costs-how-wellfound-gains-time-tranquility-with-datadome/
-
Australian Bank Backtracks on AI-Led Job Cuts
Country’s Largest Lender Bank Offers to Reinstate 45 ‘Redundant’ Workers. Commonwealth Bank of Australia reversed plans to eliminate 45 call center positions after its chatbots failed to reduce customer service volume as promised, forcing the bank to offer overtime to remaining staff while facing union challenges over what may have been disguised outsourcing to India.…
-
Australian Bank Backtracks on AI-Led Job Cuts
Country’s Largest Lender Bank Offers to Reinstate 45 ‘Redundant’ Workers. Commonwealth Bank of Australia reversed plans to eliminate 45 call center positions after its chatbots failed to reduce customer service volume as promised, forcing the bank to offer overtime to remaining staff while facing union challenges over what may have been disguised outsourcing to India.…
-
Munich Reinsurance unites global security teams to boost resilience, cut costs
Tags: access, best-practice, business, cloud, conference, cyber, cybersecurity, defense, detection, edr, group, incident response, intelligence, jobs, lessons-learned, metric, network, resilience, risk, siem, skills, soc, strategy, tactics, threat, toolConsolidate functions into one incident response team, one threat intelligence team, and one threat-hunting team serving all Munich brands around the clock.Improve team capabilities by blending the strongest skills of each team into more mature, well-rounded functions.Reduce redundancies in responsibilities, tools, and processes to cut costs.To reach these goals, Munich deployed various tactics, including:Combining best…
-
2025 CSO Hall of Fame: Meg Anderson on AI, strategic security investments, and life after InfoSec
Tags: ai, automation, business, ciso, conference, cyber, cybersecurity, finance, infosec, jobs, metric, phishing, programming, risk, risk-management, software, strategy, technology, threat, toolWhich technologies are you most cautious about from a CISO’s point of view, and why?: Meg Anderson: I’m cautious of “solutions” that don’t solve a strategic problem. CISOs only have so much budget and mindshare. You need to understand where a tool fits in your investment and strategic roadmap. There were times when my team…
-
Developer Sentenced to Four Years for Sabotaging Employer’s Systems
Davis Lu was convicted in March of deploying malicious code in the systems of his employer, Eaton, when his job responsibilities change and then deployed a kill switch that denied employees access to the systems when he was fired in 2019. He was sentenced this month to four years in prison. First seen on securityboulevard.com…
-
How AI is reshaping cybersecurity operations
Tags: access, ai, attack, business, ciso, cloud, control, cyber, cybersecurity, data, defense, detection, encryption, finance, gartner, governance, guide, hacker, infrastructure, intelligence, jobs, malware, microsoft, monitoring, phishing, regulation, resilience, risk, sans, service, skills, soc, strategy, supply-chain, technology, threat, tool, training, updateBecause AI can perform tasks at speeds that supersede human capacity, it exponentially scales the amount of work that a cybersecurity function can do, says Rob T. Lee, chief of research for AI and emerging threats and head of faculty at SANS Institute.Moreover, AI excels at doing repetitive tasks near perfectly every time, so it…
-
Troubling Tech Career Trends: From ‘Quiet Cracking’ to AI Anxiety
Some new terms are becoming popular in tech and cybersecurity careers, along with some unsettling workplace trends around burnout and fear of layoffs as AI gains ground in both the public and private sectors. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/troubling-tech-career-trends-from-quiet-cracking-to-ai-anxiety/
-
The Rise of AI-Powered Interview Cheating
From astroturfing Reddit to evading anti-cheating tools, InterviewHammer exposes a darker side of AI in hiring First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/the-rise-of-ai-powered-interview-cheating/
-
What is the cost of a data breach?
Tags: access, ai, api, attack, automation, breach, business, ciso, compliance, cyber, cyberattack, cybersecurity, data, data-breach, detection, finance, fraud, healthcare, ibm, identity, incident response, india, infrastructure, insurance, intelligence, jobs, law, metric, privacy, programming, ransom, ransomware, regulation, risk, security-incident, service, skills, software, supply-chain, technology, theft, threat, tool, vulnerabilityCanada ($4.84 million) and the UK ($4.14million) remain in the top 10 hardest hit, with ASEAN or Association of Southeast Asian Nations ($3.67 million), Australia ($2.55 million), and India ($2.51 million) among the top 15. Breaches by industry: Healthcare remains the industry hit with the highest costs per breach by far, at $7.42 million despite…
-
House lawmakers take aim at education requirements for federal cyber jobs
The bipartisan Cybersecurity Hiring Modernization Act would give the edge to skills-based hiring for cyber jobs at federal agencies. First seen on cyberscoop.com Jump to article: cyberscoop.com/federal-cybersecurity-jobs-education-requirements/

