Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Cloud Security Architect Proves Hardest Infosec Role to Fill
Newest First  |  Oldest First  |  Threaded View
lizaready
lizaready,
User Rank: Apprentice
5/30/2020 | 11:21:54 PM
Re: Certification and vacant cyber roles
Certifications can help candidates stand out: 82% of respondents prefer to hire candidates with security certifications. More than 80% had earned certifications; 85% report others on their team are certified. When asked why they prefer certified hires, respondents say it validates their cybersecurity knowledge (56%), gives them confidence the new hires will perform duties better (52%), and indicates they can keep up with the changing security landscape (40%).

 
JoshuaBrandt
JoshuaBrandt,
User Rank: Apprentice
5/29/2020 | 9:44:33 AM
Re: Certification and vacant cyber roles
The Cloud is unsafe by design, so this role is obviously hard to fill ;) Good post tho
MaxineCEC1
MaxineCEC1,
User Rank: Author
5/29/2020 | 4:26:09 AM
Certification and vacant cyber roles
Interesting survey - I wonder if companies looking to hire individuals with infosec certifications might instead consider hiring those without certifications and instead put them through relevant training? This could have a number of benefits: less expensive to hire, build the security workforce of the future, and increased employee satisfaction. I'm sure there are more benefits too!


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-30016
PUBLISHED: 2022-05-23
Rescue Dispatch Management System 1.0 is vulnerable to Incorrect Access Control via http://localhost/rdms/admin/?page=system_info.
CVE-2022-30017
PUBLISHED: 2022-05-23
Rescue Dispatch Management System 1.0 suffers from Stored XSS, leading to admin account takeover via cookie stealing.
CVE-2022-28932
PUBLISHED: 2022-05-23
D-Link DSL-G2452DG HW:T1\\tFW:ME_2.00 was discovered to contain insecure permissions.
CVE-2022-29004
PUBLISHED: 2022-05-23
Diary Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Name parameter in search-result.php.
CVE-2022-29005
PUBLISHED: 2022-05-23
Multiple cross-site scripting (XSS) vulnerabilities in the component /obcs/user/profile.php of Online Birth Certificate System v1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the fname or lname parameters.