In this article I want to share with you two stories about job hunt in cyber security world, one is a story of success and another one is a slight rant of job hunt that go south and cause stress, i’ve gather those stories from 2 ex-colleagues now friends that try to find their spot…
Category: People
Privileged Access Management (PAM)
Privileged Access Management (PAM) encompasses cybersecurity strategies and technologies designed to control elevated access and permissions across an IT environment. It focuses on identities, users, accounts, processes, and systems, aiming to reduce an organization’s attack surface and mitigate threats from external attacks and insider risks. Central to PAM is the principle of least privilege, restricting…
Information Commissioner’s Office
The Information Commissioner’s Office (ICO) plays a crucial role in ensuring that organizations handle personal data responsibly and securely. As the UK’s independent authority on data protection, privacy, and freedom of information, the ICO is instrumental in upholding individuals’ rights regarding their personal information. Responsibilities Let’s take a look at greater scale of the security…
Roles Of Security Information
In here I want us to take a look at a few job roles within a company that pay attention to infosec and protection of cyber security of it’s digital assets. Those roles are not necessary exists within every company and all of those roles. but in some cases a single role might take responsibility…
The Role of a Staff Security Engineer
As a Staff Security Engineer, the responsibilities are vast and diverse, encompassing a wide array of tasks vital to ensuring the security and integrity of our systems. While the focus is on designing and developing Big Data and real-time security analytics solutions, the role extends far beyond that. Security Engineer Key Aspect One key aspect…
Whats Information Security Manager
An Information Security Manager oversees the implementation and management of an organization’s information security program. This role encompasses a broad range of responsibilities, from developing security policies and procedures to managing risk and ensuring compliance with relevant laws and regulations. With the ever-evolving landscape of cyber threats, the Information Security Manager’s role is dynamic, requiring…
What is Netacad?
‘Netacad’ or Cisco Networking Academy steps in as a guiding light. Netacad offers a diverse curriculum to individuals interested in networking and cybersecurity. Let’s dissect what Netacad is and why it matters in today’s highly connected world. About Cisco Networking Cisco Networking encompasses a wide array of solutions, products, and services provided by Cisco Systems…