Tag: jobs
-
US Cyber Diplomacy at Risk Amid State Department Shakeup
State Moves to Restructure Cyber Bureau and Issue Mass Layoffs Despite Court Order. Current and recent former Department of State staffers told Information Security Media Group the agency is preparing to implement layoffs and begin a reorganization despite a San Francisco federal district court order blocking across-the-board layoffs at federal agencies. First seen on govinfosecurity.com…
-
Some Brother printers have a remote code execution vulnerability, and they can’t fix it
The centerpiece of Rapid7’s disclosure is CVE-2024-51978, a vulnerability rated critical (CVSS 9.8 out of 10) that enables attackers to derive the default administrator password from the device’s serial number.While another of the discovered flaws, a medium severity information disclosure vulnerability (CVE-2024-51977), potentially allows an attacker to leak the prerequisite unique serial number via the…
-
The rise of the compliance super soldier: A new human-AI paradigm in GRC
Tags: ai, automation, awareness, compliance, control, governance, grc, jobs, law, LLM, metric, regulation, risk, skills, strategy, threat, tool, training, updateRegulatory acceleration: Global AI laws are evolving but remain fragmented and volatile. Toolchain convergence: Risk, compliance and engineering workflows are merging into unified platforms. Maturity asymmetry: Few organizations have robust genAI governance strategies, and even fewer have built dedicated AI risk teams. These forces create a scenario where GRC teams must evolve rapidly, from policy monitors to strategic…
-
Pressure is mounting to cut jobs in favor of AI. Here’s why you shouldn’t.
Tags: access, ai, application-security, automation, breach, business, ciso, crowdstrike, cybersecurity, jobs, strategyShort-term savings, long-term consequences: Other experts expressed skepticism that CrowdStrike’s planned job cut are directly related to greater use of AI since the vendor has heavily relied on machine learning and similar technologies since its founding.”CrowdStrike’s layoffs are likely very little to do with AI; it is just sold as that,” Jaco Vermeulen of boutique…
-
Can 16 Principles Fix Federal IT’s Leadership Crisis?
CIO Greg Barbaccia’s Memo Targets Churn, Burnout, Fragmented Culture. When Gregory Barbaccia took the job as the U.S. federal CIO in January 2025, he became the sixth person to hold the position in eight years. Five months into his tenure, he laid out 16 operating principles in the latest attempt to stabilize leadership churn. First…
-
CrowdStrike is cutting jobs in favor of AI. Here’s why you shouldn’t.
Tags: access, ai, application-security, automation, breach, business, ciso, crowdstrike, cybersecurity, jobs, strategyShort-term savings, long-term consequences: Other experts expressed skepticism that CrowdStrike’s planned job cut are directly related to greater use of AI since the vendor has heavily relied on machine learning and similar technologies since its founding.”CrowdStrike’s layoffs are likely very little to do with AI; it is just sold as that,” Jaco Vermeulen of boutique…
-
New wave of ‘fake interviews’ use 35 npm packages to spread malware
A new wave of North Korea’s ‘Contagious Interview’ campaign is targeting job seekers with malicious npm packages that infect dev’s devices with infostealers and backdoors. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-wave-of-fake-interviews-use-35-npm-packages-to-spread-malware/
-
2025 Cybersecurity Hiring Trends Report von ISC2 – Deshalb sollten Sie (Quer-)Einsteigern eine Chance geben
First seen on security-insider.de Jump to article: www.security-insider.de/cybersecurity-hiring-trends-quereinsteiger-a-35274785b93764cfb47f39975a12715f/
-
Will AI Replace You, or Promote You? How to Stay Ahead
What can public- and private-sector staff do to stay relevant and grow their career in the midst of AI-driven tech layoffs? Here’s a roundup of recent stories and solutions to help. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/will-ai-replace-you-or-promote-you-how-to-stay-ahead/
-
UK Gov Cybersecurity Jobs Average Salary is Under £45,000, Study Finds
Bridewell’s analysis of advertised UK cybersecurity roles revealed that the public sector offers one the lowest average salaries across all industries First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/uk-cybersecurity-jobs-average/
-
Hegseth Faces Growing Pressure Over Cyber Leadership Vacuum
US Cyber Command Still Lacks a Leader – Months After Trump Fired Gen. Timothy Haugh. U.S. Defense Secretary Pete Hegseth is facing questions over the lack of leadership at U.S. Cyber Command following President Donald Trump’s April firing of Air Force Gen. Timothy Haugh and concerns over the Pentagon’s inability to recruit top cyber talent…
-
North Korean Hackers Deploy Python-Based Trojan Targeting Crypto
Python RAT PylangGhost, linked to Famous Chollima, targeted crypto professionals via fake job sites First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/north-korean-hackers-python-trojan/
-
N. Korean Hackers Use PylangGhost Malware in Fake Crypto Job Scam
North Korean hackers deploy PylangGhost malware through fake crypto job interviews targeting blockchain professionals with phishing and remote access tools. First seen on hackread.com Jump to article: hackread.com/n-korean-hackers-pylangghost-malware-crypo-job-scam/
-
‘AI is not doing its job and should leave us alone’ says Gartner’s top analyst
As for agentic AI, don’t get him started about the enormous challenge of making it work vendors just won’t discuss First seen on theregister.com Jump to article: www.theregister.com/2025/06/17/ai_not_doing_its_job/
-
The highest-paying jobs in cybersecurity today
Tags: access, ai, application-security, cisco, cloud, compliance, control, corporate, cybersecurity, data, defense, detection, firewall, governance, grc, hacker, identity, incident response, infrastructure, intelligence, jobs, network, penetration-testing, privacy, risk, risk-assessment, risk-management, skills, soc, threat, tool, training, vulnerability, vulnerability-managementSee “Top 12 cloud security certifications”See “CISSP certification: Requirements, training, exam, and cost”See “CCSP certification: Exam, cost, requirements, training, salary” Security engineer: After security architects, security engineers receive the second-highest annual cash compensation ($191,000), with a base salary of $168,000. Nearly a third (31%) of security engineers surveyed also received annual equity grants.Like their architect…
-
AI is changing cybersecurity roles, and entry-level jobs are at risk
Will humans remain essential in cybersecurity, or is AI set to take over? According to Wipro, many CISOs are leveraging AI to improve threat detection and response times and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/18/ai-humans-cybersecurity/
-
Where AI Provides Value
If you’ve worried that AI might take your job, deprive you of your livelihood, or maybe even replace your role in society, it probably feels good to see the latest AI tools fail spectacularly. If AI recommends glue as a pizza topping, then you’re safe for another day. But the fact remains that AI already…
-
Security, risk and compliance in the world of AI agents
Tags: access, ai, api, attack, automation, business, compliance, control, credentials, data, encryption, finance, framework, governance, grc, identity, infection, injection, ISO-27001, jobs, LLM, monitoring, password, privacy, regulation, resilience, risk, service, tool, trainingUnderstand and interpret natural language Access internal and external data sources dynamically Invoke tools (like APIs, databases, search engines) Carry memory to recall prior interactions or results Chain logic to reason through complex multi-step tasks They may be deployed through: Open-source frameworks like LangChain or Semantic Kernel Custom-built agent stacks powered by internal LLM APIs Hybrid orchestration models integrated across business platforms Real-world examples…
-
Exposure Management Is the Future of Proactive Security
Tags: attack, business, cloud, compliance, corporate, cybersecurity, data, guide, identity, Internet, jobs, mobile, risk, skills, strategy, technology, threat, tool, update, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Jorge Orchilles, Senior Director of Readiness and Proactive Security at Verizon, offers an up-close glimpse at the thinking that drove his move to exposure management. You can read the entire…
-
What CISOs are doing to lock in cyber talent before they bolt
Tags: business, ciso, control, credentials, cyber, cybersecurity, finance, jobs, skills, software, strategy, tool, training, vulnerabilityBuild teams from within: Recruiting talent from within the business and training existing employees, even those traditional IT roles, is what helped another CISO, Chapman shares. “I always ask CISOs, ‘Have you looked internally first?’” he says.He explains how the CISO of an industrial organization needed OT security engineers but found them hard to source.…
-
Guardz Snags $56M to Grow AI Cybersecurity Platform for MSPs
Startup Boosts AI-Driven Detection, MSP Channel Outreach and Hiring With Series B. Guardz has secured $56 million to deepen AI-powered threat detection and enhance automation for MSPs. The Series B funding will support platform engineering, channel marketing and operational scaling as Miami-based Guardz targets a simplified and consolidated cybersecurity future. First seen on govinfosecurity.com Jump…
-
Top 5 Skills Entry-Level Cybersecurity Professionals Need
Cybersecurity professional organization ISC2 found hiring managers prize teamwork, problem-solving, and analytical thinking in early-career employees. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-cybersecurity-hiring-survey-isc2/
-
HashiCorp Nomad ACL Lookup Flaw Allows Privilege Escalation
HashiCorp disclosed a critical security flaw (CVE-2025-4922) in its Nomad workload orchestration tool on June 11, 2025, exposing clusters to privilege escalation risks through improper ACL policy enforcement. The vulnerability, rated 8.1 CVSS, enables attackers to bypass namespace restrictions via strategic job naming conventions. Technical Analysis Nomad’s Access Control List (ACL) system uses prefix-based matching…
-
Ungepatchte Lücken ermöglichen Übernahme von GitLab-Konten
Tags: access, authentication, best-practice, bug, ceo, ciso, cve, cvss, cyberattack, dos, github, gitlab, incident response, injection, jobs, mfa, password, risk, sans, service, software, update, vulnerabilityExperten warnen vor einem neuen Bug in GitLab.Eine neue Sicherheitslücke in der Ultimate Enterprise Edition von GitLab ist laut einem Experten ‘gefährlich” und muss schnell gepatcht werden.Die Schwachstelle mit der Bezeichnung CVE-2025-5121 ist eine von zehn, die GitLab am Mittwoch bei der Veröffentlichung von Bugfixes und Sicherheits-Updates für selbstverwaltete Installationen beschrieben hat.’Wir empfehlen dringend, alle…
-
OffensiveCon25 Keynote: Automating Your Job? The Future Of AI and Exploit Development
Author/Presenter: Perri Adams Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton Berlin; and via the organizations YouTube channel. Thanks and a Tip O’ The Hat to Verification Labs :: Penetration Testing Specialists :: Trey Blalock…
-
Hands-on IT experience more valuable in cyber hiring, study finds
First seen on scworld.com Jump to article: www.scworld.com/brief/hands-on-it-experience-more-valuable-in-cyber-hiring-study-finds
-
2025 CSO Hall of Fame honorees
Tags: ceo, cio, ciso, corporate, cybersecurity, finance, google, group, infrastructure, international, jobs, risk, risk-management, sans, technologyMeg Anderson, VP & CISO (retired), Principal Financial Group Bob Bruns, CISO, Avanade Jonathan Chow, CISO, Genesys Mignona Cote, CISO, Infor Laura Deaner, Managing Director, CISO, The Depository Trust & Clearing Corporation (DTCC) George Finney, CISO, University of Texas System Michael Gordon, SVP & CISO, McDonald’s Ron Green, Cybersecurity Fellow/Former CSO, Mastercard Shawn Henry, CSO, CrowdStrike Todd Lukens, SVP, Security & Infrastructure, Nationwide Rishi Tripathi,…

