Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Cyber Boot Camp: Lessons Learned
Threaded  |  Newest First  |  Oldest First
Broadway0474
50%
50%
Broadway0474,
User Rank: Apprentice
7/31/2015 | 5:08:47 PM
Inspiring
Thank you for this post. In a time when it seems like every cyber headline is about a new breach or about how fragile our defenses are, it's great to have a positive article for once. Especially the part about closing the gender divide. That is what we will need to succeed with a mobile, hyperconnected and privacy-less world --- tapping into ALL of our human talent. Not just 49% of it.
tzubair
50%
50%
tzubair,
User Rank: Apprentice
7/31/2015 | 10:51:44 PM
Re: Inspiring
"In a time when it seems like every cyber headline is about a new breach or about how fragile our defenses are, it's great to have a positive article for once."

I agree. I believe it's equally important to have all the positive news amidst all kind of reports related to cybercrimes and security breaches. A good journalist should give a holistic view of the environment and bring in enough positivity to cover the negative aspects circulating around.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
8/3/2015 | 2:38:11 PM
Fantastic!
In security, user awareness is a huge facet. Getting to technology users in there earlier years will help reinforce the principles throughout their lifetime. This is a much better alternative than retroactively trying to impose security training to people set in their ways.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
8/3/2015 | 2:52:41 PM
Re: Fantastic!
Yes, this is a fantastic program on so many levels? Love to see more secuiry companies take on similar inititiaves! 
GlennN075
50%
50%
GlennN075,
User Rank: Apprentice
8/6/2015 | 4:22:35 PM
Real Problem: Bad Relations Practices By Tech Industry
As a college instructor I see this problem first-hand, every time a recruiter approaches me for hot security students. They supposedly passionately want these people, but American students are not so stupid that they can't see the way American workers are discarded by a tech industry that's practicing extremely bad public relations.

I tell my students: Don't get a job, get a contract. Don't worry about hurting your employer because they are not worried about hurting you. Do what's best for you, not your boss or your company. The "honor system" only works one direction now, so be clear that what they expect from you is not what they will give you. Above all, be really, really good, so that THEY have to come begging to YOU.

Sorry to be so cynical, but as a 25 year veteran of IT and education, the reality is quite clear to me. The tech industry has brought this on themselves.
lynnbr2
50%
50%
lynnbr2,
User Rank: Strategist
8/7/2015 | 9:03:11 PM
Re: Real Problem: Bad Relations Practices By Tech Industry
I hope your cynicism doesn't rub off on your students. It's a fine line between a white hat & a black hat. Maybe even a few shades of grey fedora in there as well. 

Interesting that the students in the boot camp took a pledge. But the jury is out on pledges - virginity pledges for instance, don't seem to hold very long. Sure wouldn't want these guys ending up trying to stick it to the man.
Locomotive
50%
50%
Locomotive,
User Rank: Apprentice
9/3/2018 | 1:18:45 PM
https://www.patchlicense.com/eset-nod32-keys-tested.html
How you know ESET' Cyber Boot Camp is a best boot?


NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This is not what I meant by "I would like to share some desk space"
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26252
PUBLISHED: 2021-01-20
OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.6, there is a vulnerability which enables remote code execution. In affected versions an administrator with permission to update product data to be able to store an executable file on the server ...
CVE-2020-26278
PUBLISHED: 2021-01-20
Weave Net is open source software which creates a virtual network that connects Docker containers across multiple hosts and enables their automatic discovery. Weave Net before version 2.8.0 has a vulnerability in which can allow an attacker to take over any host in the cluster. Weave Net is suppli...
CVE-2021-1235
PUBLISHED: 2021-01-20
A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to read sensitive database files on an affected system. The vulnerability is due to insufficient user authorization. An attacker could exploit this vulnerability by accessing the vshell of an af...
CVE-2021-1241
PUBLISHED: 2021-01-20
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CVE-2021-1247
PUBLISHED: 2021-01-20
Multiple vulnerabilities in certain REST API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to execute arbitrary SQL commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.