This is a 16 min webinar on the above subject, some useful tips - it is short and at the end focused on their services. It is worth watching. https://www.brighttalk.com/webcast/10703/199045
Watching some videos on youtube I came across the following video, I found it very interesting especially if you are looking to understand how candidates are measured in order to get a job. The author of the video divided very well the areas needed in order to have a stable career in Cyber, Experience Certifications … Continue reading Reflections on how to become a cyber security specialist
This is the last book I just finished reading, I am going to be honest with you it is a very tedious book to read if you are not new to the field however I do not want to undervalue the book as it is a very important source of knowledge for those in the … Continue reading Book: Ten strategies of a world-class Cybersecurity Operations Center
Some days ago I came across an interesting report by KPMG aimed at cyber leaders in organizations combating threats in the cyber space. It is an interesting article especially for those in the managerial field of cybersecurity, it covers different areas of cybersecurity which are currently in evolution to provide better cyber defenses in a constant … Continue reading Cyber strategy evolution, together we are stronger.
In this article I am covering the main points proved in the previous article, Network Forensics – Traffic Analysis (2) In order to report to management we will need to create a timeline that can be checked and that is supported by the evidence extracted from the pcap file. I am starting by a timeline … Continue reading Reporting to management / evidence reconstruction and hypothesis
I recently researched the role of big data in the cybersecurity field and I found an interesting project being developed by Lockheed Martin and The Oak Ridge National Lab. To provide you with some situational awareness the current state of cybersecurity is going through some challenges such as: Incident detection through signature based attacks Current … Continue reading The rise of the machines = Big Data + Machine Learning