Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Why Cybersecurity Burnout Is Real (and What to Do About It)
Oldest First  |  Newest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/21/2019 | 3:28:29 PM
Stress
At the end of every working day I would visit the Black Diamond pub for two down-ones and take the day down a notch.  3 nights a week - OK- not bad and nothing near what bad can be.  One night I had an exgtra shot with a solider returning from service and THAT was just enough to let me drive into a street sign.  Ruined radiator, and the car long with it.  I was lucky - just a street sign but stress was there from my job in malware forensics.  So I gave up - totally.  Social drinker but joined A.A. to rest assured that does not happen EVER and 11 months sober now and much happier.  Stress is a killer and more so in Cyber than normal IT support.  Highly recommend this article to all who are burned out exiting the building and heading home.   17% of CISC managers consider the drink as a defense.  I do not say no but WATCH OUT.  

 

Replacing stress - one more comment - since i turned off the bar tap, I also re-discovered an old hobby and thoroughly enjoyed it.  When I was 17 I built the Nichimo 1:200 model of the Japanese Battleship YAMATO and at 52" long it is a monster.  THAT model did not survive the years, so last August purchased a new one and built it.  When done, I moved office furniture to display it.  True.  It was my end-day therapy project, putting down all the hell of cyber secuyrity to spend 20 min figuring out a 5" gun placement, a delicate part or painting.  I bought an enormous quantity of extra(s) for the project and 5 months into it = done.  Radio control and pending Maiden Voyage in my son-in-law's pool this weekend (it is too large for the bathtub).   So in stress, find an alternative you can enjoy and spend time on.  Better than the bar tap too.  Probable as expensive though but more sane. 
MariaColeman
50%
50%
MariaColeman,
User Rank: Apprentice
2/25/2019 | 5:22:55 AM
Re: Stress
So this is why it is.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/26/2019 | 10:27:24 AM
Security professionals
advanced malware and zero-day vulnerabilities as the top cause for the operational pressure that security practitioners experience. The problem lies in here, only security professionals feel this way, the rest of the organization rest well in most cases.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/26/2019 | 10:29:14 AM
Re: Stress
At the end of every working day I would visit the Black Diamond pub for two down-ones and take the day down a notch. 3 nights a week That should certainly help. Every day? Maybe a not too much for me. :)).
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/26/2019 | 10:30:52 AM
Re: Stress
Stress is a killer and more so in Cyber than normal IT support. I agree. Most IT work is stressful, mostly thinks that are supposed to work not working and you scratch you head how it could be.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/26/2019 | 10:32:18 AM
Re: Stress
since i turned off the bar tap, I also re-discovered an old hobby and thoroughly enjoyed it. Hoppy is a great idea to deal with stress I think. I like running in the mornings, that helps a lot.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/26/2019 | 10:34:57 AM
Being aware
As a practitioner, be vocal about your state of mental well-being and stress level. Be self-aware, and don't be ashamed. This is a good point. Sometimes we burn out but not aware of it. Make people around us miserable too.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/26/2019 | 10:38:18 AM
Re: Being aware
One correction - stopping by the pub was not everyday - THAT would be way too much.  About 3 days a week so that was a sounding board for a road I almost started to turn down - alcoholic - and fortunate that i turned down my entrance home and nailed a street sign instead.  But no- not every day - bad writing that. 
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/27/2019 | 10:36:47 AM
Re: Stress
See my note above regarding 3 days a week


AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4147
PUBLISHED: 2019-09-16
IBM Sterling File Gateway 2.2.0.0 through 6.0.1.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 158413.
CVE-2019-5481
PUBLISHED: 2019-09-16
Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
CVE-2019-5482
PUBLISHED: 2019-09-16
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
CVE-2019-15741
PUBLISHED: 2019-09-16
An issue was discovered in GitLab Omnibus 7.4 through 12.2.1. An unsafe interaction with logrotate could result in a privilege escalation
CVE-2019-16370
PUBLISHED: 2019-09-16
The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algorithm, which might allow an attacker to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.