article thumbnail

GUEST ESSAY: A Memorial Day call to upskill more veterans for in-demand cybersecurity roles

The Last Watchdog

It’s no secret that cybersecurity roles are in high demand. Today there are more than 500,000 open cybersecurity roles in the U.S., Meanwhile, 200,000 well-trained and technically skilled military service members are discharged each year. This experience can also be helpful when training cybersecurity talent.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Phishing scams, malware, ransomware and data breaches are just some of the examples of cyberthreats that can devastate business operations and the protection of consumer information. Here are five notable historical events that influenced cybersecurity assessment and transformed it into what it is today: The Battle of Midway (1942).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

These Russian cyber actors are government organizations and include other parties who take their orders from the Russian military or intelligence organizations – while not technically under government control. Cybersecurity and Infrastructure Security Agency (CISA) has started a campaign to increase awareness of these risks to U.S.

article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

Kevin Mitnick, who turned legendary hacking exploits and two prison terms into a career as an esteemed cybersecurity leader, died Sunday at age 59 after a 14-month battle with pancreatic cancer, KnowBe4 revealed today. KnowBe4 has been ranked in the top 20 on our list of the top cybersecurity companies for several years.

article thumbnail

Do We Have a Cybersecurity Skills Gap?

Thales Cloud Protection & Licensing

Do We Have a Cybersecurity Skills Gap? The demand for cybersecurity skills has been on the rise for some considerable time, but in so many cases, supply has not kept up with demand. His approach uses the philosophy that is used in the military, whereby an untrained individual is placed into positions based on aptitude.

article thumbnail

DHS announces its ‘Hack DHS’ bug bounty program

Security Affairs

“As the federal government’s cybersecurity quarterback, DHS must lead by example and constantly seek to strengthen the security of our own systems,” said Secretary Alejandro N. The Hack DHS program incentivizes highly skilled hackers to identify cybersecurity weaknesses in our systems before they can be exploited by bad actors.

IT 105
article thumbnail

A zero-click vulnerability in Windows allows stealing NTLM credentials

Security Affairs

Cybersecurity researchers have shared details about a now-patched security flaw, tracked as CVE-2023-29324 (CVSS score: 6.5), in Windows MSHTML platform. “This vulnerability is yet another example of patch scrutinizing leading to new vulnerabilities and bypasses. ” concludes the expert. ” concludes the expert.