Newsroom

Posts about:

Cyber (4)

How to Get a Cyber Security Job in Banking

A cyber-security job in banking is an exciting career option for those who want to protect a financial institution’s networks from attacks. As the number of digital transactions continues to grow, this field has become increasingly important. It can be difficult to keep track of all the security precautions a bank must take, but it’s essential to stay on top of the latest developments. A job in cyber-security in banking can be an extremely rewarding experience.

Continue Reading

How Do I Get a Security Clearance?

Working as a cybersecurity professional in the U.S. can grant you access to some of this country’s most highly sensitive and confidential data. Like all Federal employees and contractors, you will undergo a standard background check detailing both your criminal and credit histories. But in addition to that, you may also be required to obtain a security clearance depending on the work you do among other factors.

Continue Reading

The Global Fight Against Ransomware

Representatives from 30 countries and the European Union met for two days last week during a White House-convened summit, developing an international coalition committed to fighting the universal problem of ransomware. Though the specifics are still being ironed out, big-picture goals for this initiative include improvement of law enforcement collaboration, reducing the illegal circulation of cryptocurrency, and developing a more diplomatic conversation around these urgent issues. Ransomware cost our world $20 billion this year alone – and the number keeps rising, with the average ransom demand in 2021 reaching over $220,000 (43% higher than the average ransom demanded in 2020) with the U.S. reporting over $400 million being paid in ransom demands globally this year to-date.

Continue Reading

Taking a Zero-Trust Approach to Cybersecurity

Cyber breaches have become increasingly devastating over the last few years, with damaging effects extending into the day-to-day operations of the federal government. Though remote work has become a societal norm and less of a business perk, organizations continue to become more and more vulnerable to cyberattacks. Federal cybersecurity personnel must continuously ascertain risk levels to ensure that users can be trusted. If the user’s risk level is not constantly checked, an attacker who had previously gained access to the system can easily maneuver around the agency’s networks far and wide without being detected.

Continue Reading

Top 20 Questions to Gauge your Cloud Security Maturity

We have seen a mass migration of data and applications form local datacenters to the public cloud.  Now while the cloud is not perfect it has a lot going for it.  The positives include an elastic, resilient and fault tolerant architecture. The cons are that its highly configurable and requires the proper controls, monitoring and service architecture to make it secure.  

Continue Reading