Newcomers to cybersecurity will find the State of Cybersecurity 2021 report from ISACA® a good resource to identify opportunities for career growth, notes Jason Yakencheck, past president of the Greater Washington, D.C., Chapter of ISACA. "Cybersecurity professionals should not lose sight of the value soft skills bring to their job and career progression," Yakencheck writes.
Hafnium-inspired cyber-attacks neutralized by AI Following the far-reaching cyber-attacks on Microsoft Exchange servers, Darktrace AI detected multiple threat actors attempting to download and install malware exploiting the ProxyLogon vulnerability. Read the blog.
Job candidates and enterprises have a role in tackling "the pervasive challenges on the cybersecurity hiring front," writes Jonathan Brandt, Information Security Professional Practices Lead at ISACA®. Today, Gregory Touhill of Carnegie Mellon University's Software Engineering Institute and executive recruiting specialist Caitlin McGaw will take on that topic at an RSA Conference panel. Full Story: RSA Conference
Columnist Noah Feldman looks at the state of cybersecurity breaches around the world and draws parallels to piracy on the high seas. "Big, powerful states need to flex their muscles and crack down on the weaker states that harbor the scofflaws," Feldman writes, adding that this "would mark a considerable change from the status quo."
Fortifying artificial intelligence functions through adversarial testing "won't make you 100% secure, but it will make you harder to fool," writes David Roe. Roe notes that procedures should be standard in areas hackers find attractive, such as monitoring security cameras and detecting fraud and spam.
Students pursuing careers in cybersecurity should expand their studies with specialized online courses, writes Amrita Dass, a career consultant in India. In this tutorial, Dass covers the areas generating the most demand in the job market, starting with network security engineer.
Cybersecurity provider Rapid7 says some customer data and source code was compromised in a hacker attack involving Codecov's Bash uploader script. Rapid7 has concluded that no other systems were affected and has reached out to customers.
Data could be used as currency, akin to "the new oil," writes Scott Snyder, senior fellow, The Wharton School. Snyder covers six steps innovators have taken to unlock their data, including avoiding some of the major flaws in artificial intelligence models.