04 Oct Weekly Rundown: How To Recruit And Retain Cybersecurity Talent In A Competitive Market
News and resources to keep you on the cutting edge of cybersecurity
– Steve Morgan, Editor-in-Chief
Sausalito, Calif. – Oct. 4, 2018
THIS WEEK
The cybersecurity stories we’re following this week, and you should too:
- How to attract and keep information technology security professionals in an ultra-competitive market.
- The official National Cyber Security Awareness Month (NCSAM) 2018 cybercrime statistics and forecast from Cybercrime Magazine’s Georgia Reid.
- Cybercrime Magazine Announces FutureCon Launch of Next Generation Cybersecurity Conferences In 24 Cities Across North America.
- Along with a new Global Cyber Center and innovation hub, NYC wants to create 10,000 jobs in cybersecurity over the next decade.
- Global software-industrial giant Honeywell (NYSE: HON) enters the market with a dedicated cybersecurity consulting service.
- New technologies have emerged to help fortify cyberdefenses… but will they work for government?
- Cybersecurity is a shared responsibility: 2018 European Cyber Security Month kicks off; 200 partners from all over Europe will run this campaign throughout the whole month of October.
- IBM provides free cybersecurity training to 14 veterans in Sandy Springs (Fulton County, Georgia).
- 90% of the data circulating in the world today was created in the last two years alone, with approximately 2.5 quintillion bytes being added to that every single day, according to IBM.
- Risk managers and other financial executives see an expanding threat of cyber-attacks, posing greater risk than from geopolitical events and new regulations.
WATCH THIS
Small Giants In Cybersecurity: Interview with EKRAN System CEO Dennis Turpitka.
THREAT INTEL
Cyber alerts from AlienVault Open Threat Exchange (OTX) — The world’s first truly open threat intelligence community:
- DanaBot Gains Popularity and Targets US Organizations in Large Campaigns.
- IOS crypto-mining and spreading via malicious content delivery system.
- Indicators of Compromise for Malware used by APT28 (also known as Fancy Bear, Pawn Storm, the Sednit Gang and Sofacy).
- Reaper Group Uses New Malware to Deploy RAT, according to Palo Alto Networks.
- Malware delivered in malicious Hangul document files targeting South Korea.
Join OTX for free to share your threat research and subscribe to other contributors.
– Curated by the Editors at Cybercrime Magazine
THE LIST
Community resources to keep you on the cutting edge of cyber:
- Quarterly cybercrime diary of data breaches and cyberattacks
- Hack blotter with cybercriminal Investigations, arrests and convictions
- 20 cybersecurity experts to follow on Twitter for crowd-sourced opinions and insights
- Cybersecurity events calendar featuring conferences and expos globally
- Big list of hacker and cybersecurity movies from 1969 to present
Check back every Thursday for a new edition of the Weekly Rundown!
– Steve Morgan is founder and Editor-in-Chief at Cybersecurity Ventures. Georgia Reid is Deputy Editor and Podcast Host at Cybercrime Magazine.
Go here to read all of my blogs and articles covering cybersecurity. Go here to send me story tips, feedback and suggestions.