8.8 C
Munich
Thursday, April 25, 2024

Articles

Steps to a Secure Portfolio: Due Diligence During M&A & Beyond

Did you know that less than five percent (5%)1 of organizations engaging in mergers and acquisitions (M&A) will consider cybersecurity risk assessments during the...

How to get Cybersecurity experience as a beginner?

The demand for skilled workers is constantly growing and if you are a beginner in infosec/cybersecurity, you need to find ways to acquire relevant...

Best Cybersecurity Certifications for Penetration Testing

Certifications in cybersecurity are essential both for job hunting, but also for you as a professional to advance your knowledge in the field. This is...

Why you should choose a career in cybersecurity

Cybersecurity is one of the fastest-growing and in-demand sectors today. In a previous article, I described the reasons why you should not get into...

Flaws in Legacy Systems, BYOD and Remote Access: How they Impact Operations Security of the Enterprise

Many information security threats stem from vulnerabilities presented by outdated workstations, network devices, and mobile devices such as tablets and smartphones. These objects are...

Is there a difference between cybersecurity and information security?

There is a tendency to use the terms Cybersecurity (CS) and Information Security (IS) interchangeably. Even though the underlying principle is similar, there are...

Your Company’s Strongest Assets Are Its Weakest Links

The Numbers Don't Lie According to IBM Security’s Cost of a Data Breach Report 2022 calculations, the top five countries and regions for the highest...

Why you should not get into cybersecurity

If you’re interested in cybersecurity, you should know that it’s not all sunshine and rainbows. The field is growing rapidly, but it is also...

Cybersecurity Analyst Interview Questions

The following list of questions is by no means exhaustive and some answers and explanations given for each are also non-exhaustive, but rather guidance...

Black Hat USA 2022: Are Cybersecurity Tool Standards on the Way?

One of the biggest challenges cybersecurity teams face, aside from constantly having to foil threat actors, is to integrate data from the various tools...

Pentest Interview Questions

If you are applying for a penetration testing role, then chances are that you will go through an in-depth interview, for which you should...

Penetration Testing vs Vulnerability Scanning

Penetration testing vs vulnerability scanning, is there a difference? Should you choose between them or both? There is a lot of misunderstanding and confusion between...

Latest