Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Wild West of Security Post-Secondary Education
Newest First  |  Oldest First  |  Threaded View
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
7/31/2017 | 2:15:43 PM
Educated on the Digital Streets
I grew up in the 80s so that meant a "security" education entailed BBS chatter, the latest issue of 2600, attending a good CON (even if it was just all locals), lots of social hacking to get library time on any system they'd let you on, walking the "digital streets" and falling, getting up and learning from your mistakes.  All the while keeping in mind that what you learned one morning might need to be discarded the next and learning something new.  And above all - no formal education.  When I see the needs in the InfoSec industry now, with all its shortages, I still feel this is the best bet for young White Hat (or Grey Hat) hopefuls.  Nothing will hold back a talented hacker more than not being able to hack freely, to build and destroy penetration labs and learn from their own mistakes, or from the knowledge of the underground.  Just the fact InfoSec education right now is considered to be a "Wild West" says it all.  Artists need freedom.  Maybe InfoSec needs some non-artists in the management roles to wrangle the wet cats, but in the end, who are these certificate programs and lengthy higher education course really designed for?  The people making all the money.  Information changes by the minute.  Exploits are born and die hourly.  there is another path to education, and it will allow you to prove yourself in measurable results.  Show me the code, somebody once said.  Talk is cheap.  And ultimately the Wild West of InfoSec education is mostly talk.

       


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-21933
PUBLISHED: 2022-01-21
ASUS VivoMini/Mini PC device has an improper input validation vulnerability. A local attacker with system privilege can use system management interrupt (SMI) to modify memory, resulting in arbitrary code execution for controlling the system or disrupting service.
CVE-2022-0326
PUBLISHED: 2022-01-21
NULL Pointer Dereference in Homebrew mruby prior to 3.2.
CVE-2022-22930
PUBLISHED: 2022-01-21
A remote code execution (RCE) vulnerability in the Template Management function of MCMS v5.2.4 allows attackers to execute arbitrary code via a crafted payload.
CVE-2022-23314
PUBLISHED: 2022-01-21
MCMS v5.2.4 was discovered to contain a SQL injection vulnerability via /ms/mdiy/model/importJson.do.
CVE-2022-23315
PUBLISHED: 2022-01-21
MCMS v5.2.4 was discovered to contain an arbitrary file upload vulnerability via the component /ms/template/writeFileContent.do.