Global spending on cybersecurity products and services is expected to increase by 12-15% each year until 2021, with IoT (internet of things) products leading the way. Since any product connected to the internet is a potential target for hacking, it’s no surprise that the information security market is expected to grow over the next few […]

As with any job interview, an applicant for a cybersecurity position needs to speak knowledgeably about the specific job’s responsibilities and the field in general. Information security job interview questions might revolve around one specific task—say, designing firewalls or safeguarding information in certain applications. However, depending on the role and how encompassing it is, cybersecurity […]

Many cybersecurity tactics are inspired by military wargaming, but none more so than red teaming and blue teaming. A form of ethical hacking, red teaming and blue teaming involve companies hiring highly trained cybersecurity experts to infiltrate their computer systems, networks, and servers. The point of hiring an ethical hacker is to strengthen the organization’s […]

While hacking is ordinarily considered an illegal activity, ethical hacking involves companies hiring highly trained cybersecurity experts for the express purpose of infiltrating their computer networks, systems and web applications. The logic behind these simulated cyberattacks is that they enable organizations to preemptively uncover vulnerabilities, anticipate the antics of cybercriminals and create disaster recovery plans […]

A cyber attack takes place every 39 seconds, according to a University of Maryland study. Consequently, organizations receive thousands or even millions of alerts each month. Security analysts must stay up to date with the latest cyber-attack strategies, security tools, compliance regulations, and industry trends in order to mount a strong defense. From network security […]

Before the advent of broadband internet and the browser cookie, advertisements were annoying, sexist and filled with misleading scientific claims—but they weren’t invasive like they are today. “Personalized” ads, as the industry prefers to call them, perpetuate a system of surveillance capitalism, where big ad tech companies and data brokers aggregate personal information on every […]

A Security Operations Center (SOC) analyst is a cybersecurity professional who works on a team to monitor and counteract threats to an organization’s IT infrastructure. SOC refers to the name of the team they work on. The main responsibility of an SOC analyst is to assess security systems and measures for weaknesses and report cyber […]

With a strong employment outlook and proliferation of online training resources, starting a cybersecurity career has never been easier. Cybersecurity analysts are responsible for monitoring computer infrastructure and information systems to ensure they are protected from cyber threats. They do this using a multi-pronged approach designed to deter, detect and de-escalate a cyberattack: Installing and […]