Tag: jobs
-
ITJobs 5 bittere Wahrheiten
Tags: breach, business, cio, cisco, ciso, cybersecurity, cyersecurity, gartner, germany, jobs, network, risk, risk-management, strategy, trainingViel Geld schützt nicht vor Burnout.Die Nachfrage nach Cybersecurity-Spezialisten ist ähnlich hoch wie deren Gehälter. Laut einem aktuellen, US-zentrischen Benchmark Report von IANS und Artico Search liegt das durchschnittliche Grundgehalt für Führungsrollen im Bereich IT-Security in Nordamerika bei mehr als 150.000 Dollar jährlich. Und auch wenn die Vergütung in Europa und Deutschland generell etwas geringer…
-
ITJobs 5 bittere Wahrheiten
Tags: breach, business, cio, cisco, ciso, cybersecurity, cyersecurity, gartner, germany, jobs, network, risk, risk-management, strategy, trainingViel Geld schützt nicht vor Burnout.Die Nachfrage nach Cybersecurity-Spezialisten ist ähnlich hoch wie deren Gehälter. Laut einem aktuellen, US-zentrischen Benchmark Report von IANS und Artico Search liegt das durchschnittliche Grundgehalt für Führungsrollen im Bereich IT-Security in Nordamerika bei mehr als 150.000 Dollar jährlich. Und auch wenn die Vergütung in Europa und Deutschland generell etwas geringer…
-
What Identity Federation Means for Workloads in Cloud-Native Environments
7 min readManaging identity across cloud providers used to be a human problem think SSO portals and workforce identity sync. However, as infrastructure becomes more automated, the real fragmentation now resides between workloads: CI/CD pipelines authenticating to SaaS tools, containers accessing APIs, and jobs calling into services across clouds. Each environment has its identity system,…
-
Click Here to Serve: How Volunteering Builds Cyber Careers
Cyber Volunteers Can Gain Real-World Experience While Protecting Communities When people think about a career in cybersecurity, they often picture certifications, technical exams and entry-level jobs that require years of preparation. For those coming from non-traditional backgrounds, the journey can feel like a dead end. But what if there were other ways to explore it?…
-
CISA’s relationship with industry needs work to reestablish trust, experts say
Critics say budget cuts, job losses have hurt the agency’s ability to coordinate with private industry. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisas-industry-relationship-needs-trust/756941/
-
IT firing spree: Shrinking job market looks even worse after BLS revisions
Tags: jobsThe payroll growth we thought we experienced in May and June? Gone, like tears in the rain First seen on theregister.com Jump to article: www.theregister.com/2025/08/04/it_job_market_july/
-
5 hard truths of a career in cybersecurity, and how to navigate them
Tags: access, ai, application-security, attack, awareness, best-practice, breach, business, cio, ciso, conference, control, cyber, cybersecurity, data-breach, finance, firewall, framework, gartner, identity, ISO-27001, jobs, mitigation, network, regulation, risk, risk-assessment, risk-management, skills, strategy, technology, threat, training, wafCybersecurity teams protect systems but neglect people: After all the effort it takes to break into cybersecurity, professionals often end up on teams that don’t feel welcoming or supportive.Jinan Budge, a research director at Forrester who focuses on enabling CISOs and other technical leaders, believes the way most cybersecurity career paths are structured plays a…
-
Keyfactor Hires Trend Micro Veteran Louise McEvoy As Channel Chief
Tags: jobsKeyfactor announced Monday it has hired Louise McEvoy, a longtime channel sales executive at Trend Micro, as its new channel chief. First seen on crn.com Jump to article: www.crn.com/news/security/2025/keyfactor-hires-trend-micro-veteran-louise-mcevoy-as-channel-chief
-
6 things keeping CISOs up at night
Tags: access, ai, attack, breach, business, cio, ciso, cloud, compliance, control, cyber, data-breach, deep-fake, email, exploit, infrastructure, jobs, metric, password, phishing, regulation, risk, service, technology, threat, tool, training, vulnerabilityAI’s potential to create a competency crisis: At mental health organization Headspace CISO Jameeka Aaron sees many potential applications for AI but she is balancing enablement with caution. However, Aaron is particularly concerned about the impact of generative AI on the hiring process.While strong developers can leverage AI to their advantage, weaker developers may appear…
-
Senate confirms national cyber director pick Sean Cairncross
The president selected the former RNC, White House and Millennium Challenge Corporation official for the job in February. First seen on cyberscoop.com Jump to article: cyberscoop.com/sean-cairncross-senate-confirmation-national-cyber-director/
-
Ninety laptops, millions of dollars: US woman jailed over North Korea remote-work scam
Christine Chapman apologizes for role in identity fraud that amassed millions to allegedly aid nuclear weapons programIn March 2020, about the time the Covid pandemic started, Christina Chapman, a woman who lived in Arizona and Minnesota, received a message on LinkedIn asking her to “be the US face” of a company and help overseas IT…
-
>>Polyworking<< erhöht Cybersicherheitsrisiken massiv
Der Trend zu mehreren parallelen Jobs macht junge Arbeitnehmer zur Zielscheibe von Cyberkriminellen. Kaspersky registrierte allein in Deutschland 125.000 Angriffe über gefälschte Arbeitstools. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/polyworking-cybersicherheitsrisiken
-
Google Will Use AI to Guess People’s Ages Based on Search History
Plus: A former top US cyber official loses her new job due to political backlash, Congress is rushing through a bill to censor lawmakers’ personal information online, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-google-will-use-ai-to-guess-peoples-ages-based-on-search-history/
-
Male-Dominated Cyber Industry Still Holds Space for Women With Resilience
When trying to crack your way into a cyber career, true passion and a bold love of the industry is a must, if you want to set yourself apart from hundreds of other job applicants, according to Weave CISO Jessica Sica. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/male-dominated-cyber-industry-still-holds-space-for-women-with-resilience
-
Beyond Code: Why Your Next Full Stack Hire Should Think Like a Product Owner
Tags: jobsHiring a full stack dev who doesn’t think like a product owner is like putting a sniper rifle in the hands of someone who doesn’t…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/07/beyond-code-why-your-next-full-stack-hire-should-think-like-a-product-owner/
-
Why stolen credentials remain cybercriminals’ tool of choice
It’s often the case that the simplest tools have the longest staying power, because they ultimately get the job done. Take duct tape, for example: it’s a sturdy household … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/31/stolen-credentials/
-
404 Path Not Found: Finding Direction in a Fickle Job Market
Advice for Young Cyber Professionals in the Age of AI and Security Automation Professionals across industries, especially those in early career stages, are struggling to find not only jobs but also career path direction. The old map no longer applies. Today’s environment requires adaptability, strategy and a willingness to build new paths entirely. First seen…
-
How CISOs can scale down without compromising security
Tags: breach, business, ciso, compliance, control, cybersecurity, data, detection, finance, framework, gartner, governance, intelligence, jobs, metric, open-source, regulation, resilience, risk, soc, strategy, threat, tool, training, vulnerabilityStrategic risk (high, medium, low): What’s the actual exposure if this control fails?Business alignment: Which functions are enabling revenue, customer trust, or compliance?No-brainers: These are redundant tools, shelfware, or “security theatre” controls that look good on paper but deliver no measurable protection.For this assessment, Mahdi brings together a cross-functional team that includes business unit leaders,…
-
Dashlane Revamps Partner Program, Hires First Channel Chief For Credential Security Push
Dashlane announced a redesigned program Wednesday along with the hire of its first-ever channel chief as the credential security vendor looks to rely more heavily on partners for its next phase of growth. First seen on crn.com Jump to article: www.crn.com/news/security/2025/dashlane-revamps-partner-program-hires-first-channel-chief-for-credential-security-push
-
Cybersecurity Hiring Trends – Stellenbesetzung dauert in Deutschland besonders lange
First seen on security-insider.de Jump to article: www.security-insider.de/cybersicherheitsposten-neubesetzung-schulungskosten-deutschland-a-a23a565017e25bb75c11a819507285dd/
-
The CISO’s challenge: Getting colleagues to understand what you do
Tags: access, authentication, ceo, cio, ciso, cybersecurity, Hardware, jobs, office, risk, saas, technology‘Chief’ in name only adds to the confusion: Like other executive-sounding titles, such as chief marketing officer, chief revenue officer, chief technology officer, and others, CISOs sound like they should be officers of the company with broad decision-making capabilities, but in most cases, they lack any actual power.”There are some CISOs that sort of rise…
-
Arizona Woman Jailed for Helping North Korea in $17M IT Job Scam
Arizona woman jailed 8.5 years for aiding North Korea’s $17 million IT job scam, defrauding over 300 US companies. Learn how to protect your business from such sophisticated cybersecurity threats. First seen on hackread.com Jump to article: hackread.com/arizona-woman-jailed-help-north-korea-it-job-scam/
-
Intel abandons chip plants in Germany and Poland, confirms more layoffs
CEO Lip-Bu Tan says strategy shift will focus on customer needs, efficiency, and cutting costs First seen on theregister.com Jump to article: www.theregister.com/2025/07/25/intel_european_retreat/
-
Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft pins on-prem SharePoint attacks on Chinese threat actors As … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/27/week-in-review-microsoft-sharepoint-servers-under-attack-landing-your-first-cybersecurity-job/
-
Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme
Arizona woman gets 8 years for helping North Korea-linked threat actors to infiltrate 309 U.S. firms with fake IT jobs. Christina Marie Chapman (50) from Arizona, was sentenced to 102 months in prison for aiding North Korean IT workers in infiltrating 309 U.S. companies. She pleaded guilty to charges including aggravated identity theft, conspiracy to…
-
Arizona woman sentenced to 8.5 years for running North Korean laptop farm
Prosecutors said Chapman helped the North Korean IT workers obtain jobs at 309 companies, including a major television network, a car maker, a media company, a Silicon Valley technology company and more. First seen on therecord.media Jump to article: therecord.media/arizona-woman-sentenced-north-korean-laptop-farm

