Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Cloud Security Architect Proves Hardest Infosec Role to Fill
Newest First  |  Oldest First  |  Threaded View
lizaready
50%
50%
lizaready,
User Rank: Apprentice
5/30/2020 | 11:21:54 PM
Re: Certification and vacant cyber roles
Certifications can help candidates stand out: 82% of respondents prefer to hire candidates with security certifications. More than 80% had earned certifications; 85% report others on their team are certified. When asked why they prefer certified hires, respondents say it validates their cybersecurity knowledge (56%), gives them confidence the new hires will perform duties better (52%), and indicates they can keep up with the changing security landscape (40%).

 
JoshuaBrandt
100%
0%
JoshuaBrandt,
User Rank: Apprentice
5/29/2020 | 9:44:33 AM
Re: Certification and vacant cyber roles
The Cloud is unsafe by design, so this role is obviously hard to fill ;) Good post tho
MaxineCEC1
100%
0%
MaxineCEC1,
User Rank: Author
5/29/2020 | 4:26:09 AM
Certification and vacant cyber roles
Interesting survey - I wonder if companies looking to hire individuals with infosec certifications might instead consider hiring those without certifications and instead put them through relevant training? This could have a number of benefits: less expensive to hire, build the security workforce of the future, and increased employee satisfaction. I'm sure there are more benefits too!


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13995
PUBLISHED: 2020-09-25
U.S. Air Force Sensor Data Management System extract75 has a buffer overflow that leads to code execution. An overflow in a global variable (sBuffer) leads to a Write-What-Where outcome. Writing beyond sBuffer will clobber most global variables until reaching a pointer such as DES_info or image_info...
CVE-2020-7735
PUBLISHED: 2020-09-25
The package ng-packagr before 10.1.1 are vulnerable to Command Injection via the styleIncludePaths option.
CVE-2020-15394
PUBLISHED: 2020-09-25
The REST API in Zoho ManageEngine Applications Manager before build 14740 allows an unauthenticated SQL Injection via a crafted request, leading to Remote Code Execution.
CVE-2020-15521
PUBLISHED: 2020-09-25
Zoho ManageEngine Applications Manager before 14 build 14730 has no protection against jsp/header.jsp Cross-site Scripting (XSS) .
CVE-2020-26103
PUBLISHED: 2020-09-25
In cPanel before 88.0.3, an insecure site password is used for Mailman on a templated VM (SEC-551).