6 Tips for Breaking Into Cybersecurity
Cyber Security Heroes
by IRONSCALES
1y ago
Cybersecurity is a broad field with new opportunities appearing every year.  But what do you need to do to stand out among the job seekers and break into the industry? There is no one path to landing a job in cyber, but there are a few best practices to attain the skills you need to get your foot in the door.  In this episode, Paul Charles, Senior Consultant of Cyber Security at Forward Roll Recruitment and Founder of Cyber Jobs Hunting Discord Server, shared his recommendations for job seekers on how to break into a career in cybersecurity how how hiring managers can support them. S ..read more
Visit website
How To Succeed In Red Teaming Without Experience
Cyber Security Heroes
by IRONSCALES
1y ago
You don’t need to be a technical wizard to succeed in red teaming.  And people with no or low experience don’t have to go through months of training before you give them work. There are many components of red teaming that can be taught in a short amount of time from open source reconnaissance to proofreading reports. In this episode, Travis DeForge, security engineering manager at GoVanguard, discusses how a few changes to your onboarding process can expand your talent pool and allow all levels of your team to upgrade their skills. Show Links Check out GoVanguard Connect with Travis DeFo ..read more
Visit website
Why search and delete is the wrong approach to phishing incident response
Cyber Security Heroes
by IRONSCALES
1y ago
Search and delete is a common response to phishing emails, but it’s not the best approach.  It’s inefficient, ineffective, and with the sheer volume of phishing attacks, it’s not feasible as a standard practice. The only thing search and delete truly provides is a false sense of security.   In this episode, IRONSCALES’ Senior Director of Sales Engineering and Information Security, and former email administrator, Stephen Kowski talks us through what to do instead. **Show Links** Connect with J. Stephen Kowski on LinkedIn or Twitter Follow IRONSCALES on LinkedIn or Twitter Connec ..read more
Visit website
How to Prevent an Identity and Access Management System Breach
Cyber Security Heroes
by IRONSCALES
1y ago
When identity access management system Okta was breached earlier this year, 366 companies had their data compromised.  For those companies, a single point of failure put their data, and business, at risk. Because of the nature of Okta and similar systems, it wasn’t clear what, if any, changes had been made. That meant their disaster recovery process was more complicated than expected.  In this episode, accSenSe CEO Muli Motola explains the things that any company using identity access management systems can do right now to make their disaster recovery plan stronger and protect themse ..read more
Visit website
5 Things You Need to Know About Modern Disaster Recovery
Cyber Security Heroes
by IRONSCALES
1y ago
The biggest mistake companies make is not having a suitable disaster recovery plan in place. They think that a box of tapes serving as their backup is enough.  That might have been true a couple of decades ago, but with ransomware attacks happening every few minutes, that won’t cut it anymore.  In this episode, Curtis Preston, Chief Technical Evangelist of Druva, explains how a disaster recovery plan is like health insurance. It requires time and money upfront when things are okay, but it saves you when the worst happens. Show Links Check out Druva Connect with Curtis Preston on Lin ..read more
Visit website
How to Find Cybersecurity Talent in a Candidate-Driven Market
Cyber Security Heroes
by IRONSCALES
1y ago
Cybersecurity companies need to be realistic when recruiting new talent.  With so many companies hiring, there is stiff competition for candidates. Job descriptions that require a long list of certifications for entry level jobs won’t get filled easily. One with a salary below market or few days off won’t either.  In this episode #15 of our #1SEAT series, Tomas Walker, former cybersecurity specialist recruitment consultant for Premier Group Recruitment, tells us how cybersecurity companies need to be better prepared for the current job market. Show Links Check out Cyberfort Group Ch ..read more
Visit website
Adrianus Warmenhoven, Defensive Strategist @Nord Security
Cyber Security Heroes
by IRONSCALES
1y ago
Adrianus Warmenhoven was one of the first web-hosters in Europe, setting up ISPs in the very early 1990s and the first ISP in Tanzania. He has worked with National Forensics Institute on cybercrime, taught at Universities on subjects such as security, performance and scaling. And he was involved in the groundwork investigations that helped him win the Mitre challenge. In this episode, we covered a lot of ground covering Adrianus's history, thoughts and aspirations toward a more privacy-centric society. Show Links Check out Nord Security  Connect with Adrianus on LinkedIn  Follow IRO ..read more
Visit website
Cybersecurity benefits of behavioral biometrics and adversarial machine learning
Cyber Security Heroes
by IRONSCALES
1y ago
Justin Macorin, CTO and Co-founder at Ponsero discussed with me some cybersecurity use cases for NLP and behavioral biometric technology, especially when it comes to phishing and spam!We also discussed AI and ML misconceptions, the importance of quality data sets to train the models and how all of this can help give companies a fighting chance against cyber-criminals. Show Links Check out Ponsero  Connect with Justin-Macorin on LinkedIn  Follow IRONSCALES on LinkedIn or Twitter Connect with Brendon Rod on LinkedIn  -------- CyberSecurity Heroes is brought to you by IRONSCALES ..read more
Visit website
Navigating The Complex Ecosystem Of Subjects, Resources & Endless Certs
Cyber Security Heroes
by IRONSCALES
1y ago
Christian Scott is the COO and Chief Information Security Officer at GoVanguard, a boutique cybersecurity firm that performs red teaming services, like penetration testing and social engineering.  They do a lot of work for multi-billion dollar hedge funds, international internet service providers, insurance companies and international banks.In this episode #14 of our mini-series #1SEAT, we discuss the complex cybersecurity ecosystem of subjects, free resources, endless certs and boot camps.  Tune in for Christian's recommendations on how people can navigate all of this information in ..read more
Visit website
How to Create Cybersecurity Training Playbooks
Cyber Security Heroes
by IRONSCALES
2y ago
A good training program is not just beneficial to new hires.  It’s beneficial to everyone. Clear playbooks that can be referred to time and again make everyone stronger and reduce turnover. But many companies are missing the mark when it comes to the onboarding process from a lack of documentation to murky procedures.  In this episode part 11 of our #1SEAT mini-series, Christina Westfall, Threat Detection Analyst at Pareto Cyber, explains how getting a training program in place can empower your team from the job description all the way through independent employee success.------Cyber ..read more
Visit website

Follow Cyber Security Heroes on FeedSpot

Continue with Google
Continue with Apple
OR