Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Preventing PTSD and Burnout for Cybersecurity Professionals
Oldest First  |  Newest First  |  Threaded View
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
9/16/2019 | 2:40:16 PM
PTSD is not correct here
Trauma neither - this is standard stress within the computer industry and all careers can have it from a help desk (problem and ticket overload) to server admins (nothing like a failed data center on a Friday) to ransomware across the entire firm.  Stress is common enough in life as it is.  My own qualification for PTSD is that my data center crashed down 103 floors in the south tower on September 11 and I was only 2 floors down from 103 and made it down to the ground and live.  THAT is PTSD my friends.  Plus I saw 3 people fall from the north tower and die.  That is a room I do not go into very often.  I want remain sane.  Every September 11 it hits me hard from 8:46 a.m. to 10:29.  Severe PTSD attack so I have no sympathy for an over-stressed sys admin or security consultant being defined as a PTSD case.  Stress?  Mega-stress?  Fine, been there, done that.  But to use this argument for cyber sec is just wrong and does ill to those of us who have been through a living hell and survived. 

BTW - many of my response posts relate to disaster recovery and business continuity scenarios which do not exist whenever a ransomware attack happens.  I am strong on this subject precisely because of September 11.

Update - I realize that this note seems really mean and nasty to the article which does have good points all over - I am just strong on this subject for obvious reasons so take my commentary with a big grain of salt and a shot of Dewars.  Thanks


Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27638
PUBLISHED: 2020-10-22
receive.c in fastd before v21 allows denial of service (assertion failure) when receiving packets with an invalid type code.
CVE-2020-27642
PUBLISHED: 2020-10-22
A cross-site scripting (XSS) vulnerability exists in the 'merge account' functionality in admins.js in BigBlueButton Greenlight 2.7.6.
CVE-2020-27621
PUBLISHED: 2020-10-22
The FileImporter extension in MediaWiki through 1.35.0 was not properly attributing various user actions to a specific user's IP address. Instead, for various actions, it would report the IP address of an internal Wikimedia Foundation server by omitting X-Forwarded-For data. This resulted in an inab...
CVE-2020-27620
PUBLISHED: 2020-10-22
The Cosmos Skin for MediaWiki through 1.35.0 has stored XSS because MediaWiki messages were not being properly escaped. This is related to wfMessage and Html::rawElement, as demonstrated by CosmosSocialProfile::getUserGroups.
CVE-2020-27619
PUBLISHED: 2020-10-22
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.