<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>what is cyber security | Net Security Training</title>
	<atom:link href="https://www.net-security-training.co.uk/tag/what-is-cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.net-security-training.co.uk</link>
	<description>Shaping the skills of Cyber Professionals</description>
	<lastBuildDate>Thu, 29 Aug 2019 09:37:10 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.net-security-training.co.uk/wp-content/uploads/2019/11/cropped-fav-32x32.png</url>
	<title>what is cyber security | Net Security Training</title>
	<link>https://www.net-security-training.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Bluetooth BlueBorne Attack Puts Billions of Devices at Risk</title>
		<link>https://www.net-security-training.co.uk/blueborne-critical-bluetooth-attack/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 05 Dec 2018 14:37:09 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[computersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Intrusion Analyst Apprenticeship]]></category>
		<category><![CDATA[cyber intrusion analyst training uk]]></category>
		<category><![CDATA[cyber network security]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber Risk apprenticeship]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security basics]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security services]]></category>
		<category><![CDATA[cyber security technologist apprenticeship]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber technologist apprenticeship]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=4398</guid>

					<description><![CDATA[If you are using a Bluetooth enabled device, be it a smartphone, laptop, smart TV or any other IoT device, you are at risk of malware attacks that can carry out remotely to take over your device even without requiring any interaction from your side. Security researchers have just discovered total 8 zero-day vulnerabilities in [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>If you are using a Bluetooth enabled device, be it a smartphone, laptop, smart TV or any other IoT device, you are at risk of malware attacks that can carry out remotely to take over your device even without requiring any interaction from your side. Security researchers have just discovered total 8 zero-day vulnerabilities in Bluetooth protocol that impact more than 5.3 Billion devices—from Android, iOS, Windows and Linux to the Internet of things (IoT) devices—using the short-range wireless communication technology. Using these vulnerabilities, security researchers at IoT security firm Armis have devised an attack, dubbed BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a &#8220;man-in-the-middle&#8221; connection to gain access to devices&#8217; critical data and networks without requiring any victim interaction.</p>
<p>All an attacker need is for the victim&#8217;s device to have Bluetooth turned on and obviously, in close proximity to the attacker&#8217;s device. Moreover, successful exploitation doesn&#8217;t even require vulnerable devices to be paired with the attacker&#8217;s device.</p>
<div id="attachment_4399" style="width: 738px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-4399" class="wp-image-4399 size-full" src="https://www.net-security-training.co.uk/wp-content/uploads/2017/09/BlueTooth-Attack.png" alt="BlueBorne attack" width="728" height="380" /><p id="caption-attachment-4399" class="wp-caption-text">BlueBorne</p></div>
<p>What&#8217;s more worrisome is that the BlueBorne attack could spread like the wormable WannaCry ransomware that emerged earlier this year and wreaked havoc by disrupting large companies and organisations worldwide. Ben Seri, head of research team at Armis Labs, claims that during an experiment in the lab, his team was able to create a botnet network and install ransomware using the BlueBorne attack.</p>
<p>However, Seri believes that it is difficult for even a skilled attacker to create a universal wormable exploit that could find Bluetooth-enabled devices, target all platform together and spread automatically from one infected device to others.</p>
<p>&#8220;Unfortunately, this set of capabilities is extremely desirable to a hacker. BlueBorne can serve any malicious objective, such as cyber espionage, data theft, ransomware, and even creating large botnets out of IoT devices like the Mirai Botnet or mobile devices as with the recent WireX Botnet,&#8221; Armis said. &#8220;The BlueBorne attack vector surpasses the capabilities of most attack vectors by penetrating secure &#8220;air-gapped&#8221; networks which are disconnected from any other network, including the internet.&#8221;</p>
<p>&nbsp;</p>
<p>Apply Security Patches to Prevent Bluetooth Hacking</p>
<p>The security firm responsibly disclosed the vulnerabilities to all the major affected companies a few months ago—including Google, Apple and Microsoft, Samsung and Linux Foundation.</p>
<p>These vulnerabilities include:</p>
<ul>
<li>Information Leak Vulnerability in Android (CVE-2017-0785)</li>
<li>Remote Code Execution Vulnerability (CVE-2017-0781) in Android&#8217;s Bluetooth Network Encapsulation Protocol (BNEP) service</li>
<li>Remote Code Execution Vulnerability (CVE-2017-0782) in Android BNEP&#8217;s Personal Area Networking (PAN) profile</li>
<li>The Bluetooth Pineapple in Android—Logical flaw (CVE-2017-0783)</li>
<li>Linux kernel Remote Code Execution vulnerability (CVE-2017-1000251)</li>
<li>Linux Bluetooth stack (BlueZ) information leak vulnerability (CVE-2017-1000250)</li>
<li>The Bluetooth Pineapple in Windows—Logical flaw (CVE-2017-8628)</li>
<li>Apple Low Energy Audio Protocol Remote Code Execution vulnerability (CVE Pending)“Microsoft released security updates in July and customers who have Windows Update enabled and applied the security updates, are protected automatically. We updated to protect customers as soon as possible, but as a responsible industry partner, we withheld disclosure until other vendors could develop and release updates.” – A Microsoft spokesperson said.</li>
<li>Google and Microsoft have already made security patches available to their customers, while Apple iOS devices running the most recent version of its mobile operating system (that is 10.x) are safe.</li>
</ul>
<p>What&#8217;s worst? All iOS devices with 9.3.5 or older versions and over 1.1 Billion active Android devices running older than Marshmallow (6.x) are vulnerable to the BlueBorne attack. Moreover, millions of smart Bluetooth devices running a version of Linux are also vulnerable to the attack. Commercial and consumer-oriented Linux platform (Tizen OS), BlueZ and 3.3-rc1 are also vulnerable to at least one of the BlueBorne bugs. Android users need to wait for security patches for their devices, as it depends on your device manufacturers. In the meantime, they can install &#8220;BlueBorne Vulnerability Scanner&#8221; app (created by Armis team) from Google Play Store to check if their devices are vulnerable to BlueBorne attack or not. If found vulnerable, you are advised to turn off Bluetooth on your device when not in use.</p>
<p>Reference:</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber-attacks &#124; Councils unprepared for cyber-attacks</title>
		<link>https://www.net-security-training.co.uk/councils-unprepared-cyber-attacks/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 28 Feb 2018 09:48:42 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[computersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Intrusion Analyst Apprenticeship]]></category>
		<category><![CDATA[cyber intrusion analyst training uk]]></category>
		<category><![CDATA[cyber network security]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber Risk apprenticeship]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security basics]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security services]]></category>
		<category><![CDATA[cyber security technologist apprenticeship]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber technologist apprenticeship]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=9430</guid>

					<description><![CDATA[More than 25% of UK councils have had their computer systems breached in the past five years, campaigners say. A report by privacy group Big Brother Watch based on freedom of information requests found 114 councils experienced at least one incident between 2013 and 2017. The group said it was &#8220;shocked&#8221; that staff often lacked [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="attachment_9431" style="width: 457px" class="wp-caption alignnone"><img decoding="async" aria-describedby="caption-attachment-9431" class="wp-image-9431" src="https://www.net-security-training.co.uk/wp-content/uploads/2018/02/100097992_617ea8bc-7ecb-46ab-b325-916b437bc7e1-300x169.jpg" alt="cyber-attacks" width="447" height="252" /><p id="caption-attachment-9431" class="wp-caption-text">cyber-attacks</p></div>
<p class="story-body__introduction">More than 25% of UK councils have had their computer systems breached in the past five years, campaigners say. A report by privacy group Big Brother Watch based on freedom of information requests found 114 councils experienced at least one incident between 2013 and 2017. The group said it was &#8220;shocked&#8221; that staff often lacked cyber-attacks training.</p>
<p>The Local Government Association said councils took their privacy responsibilities &#8220;extremely seriously&#8221;.</p>
<h2 class="story-body__crosshead">&#8216;Protect citizens&#8217; from cyber-attacks</h2>
<p>Big Brother Watch said it had received responses from 395 local authorities and that, of the 114 that said their systems had been breached, 25 reported they had experienced a data loss or breach as a result.</p>
<p>It said the majority of successful cyber-attacks began with so-called phishing emails designed to trick staff into revealing passwords and other data.</p>
<p>Big Brother Watch said humans were the weakest link the cyber-security chain and the risk could only be reduced by introducing training for all council employees.</p>
<p>Three-quarters of councils did not provide mandatory cyber-security training, and 16% did not provide any at all, according to the report.</p>
<figure class="media-landscape no-caption body-width"></figure>
<figure class="media-landscape no-caption body-width"></figure>
<p>Jennifer Krueckeberg, the lead researcher at Big Brother Watch, said: &#8220;One would assume that they [councils] would be doing their utmost to protect citizens&#8217; sensitive information.</p>
<p>&#8220;Local authorities need to take urgent action and make sure they fulfill their responsibilities to protect citizens,&#8221; she added.</p>
<p>Based on the FoI data, the report estimates the number of cyber-attacks on local authorities, which hold the data of millions of residents, at 98 million between 2013 and 2017.</p>
<p>This amounts to 37 attacks every minute.</p>
<figure class="media-landscape no-caption full-width"></figure>
<figure class="media-landscape no-caption full-width"></figure>
<figure class="media-landscape no-caption full-width"></figure>
<figure class="media-landscape no-caption full-width"></figure>
<p>A Local Government Association spokesman said: &#8220;Very few of these attacks actually manage to breach the firewalls or scanning systems in place.&#8221;</p>
<p>He added that councils were working with the National Cyber Security Centre to ensure their systems &#8220;are as robust and resilient as possible&#8221;.</p>
<p>It comes as figures released earlier this month by the National Cyber Security Centre showed Britain is repelling millions of attacks a month.</p>
<p>They showed that councils are among the organizations most commonly imitated in emails designed to gain trust.</p>
<p><a href="https://www.net-security-training.co.uk/course-list/">Click here</a> to find out abour Net Security&#8217;s Cyber Security courses to help your business crack down on Cyber Security threats.</p>
<p>Reference: http://www.bbc.co.uk/news/uk-43121581?intlink_from_url=http://www.bbc.co.uk/news/topics/cz4pr2gd85qt/cyber-security&amp;link_location=live-reporting-story</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers Could Cause Global Chaos</title>
		<link>https://www.net-security-training.co.uk/hackers-cause-global-chaos/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 27 Feb 2018 08:58:19 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[computersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Intrusion Analyst Apprenticeship]]></category>
		<category><![CDATA[cyber intrusion analyst training uk]]></category>
		<category><![CDATA[cyber network security]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber Risk apprenticeship]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security basics]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security services]]></category>
		<category><![CDATA[cyber security technologist apprenticeship]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber technologist apprenticeship]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=9372</guid>

					<description><![CDATA[Hackers Artists and criminals are often the first to push the boundaries of technology. Barrett Brown is a criminal who has actually helped inspire art — the TV show Mr. Robot. Its protagonist is a hacktivist . hackers who break into computer systems to promote a cause. Brown was connected to Anonymous, a group that hacked [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Hackers Artists and criminals are often the first to push the boundaries of technology. Barrett Brown is a criminal who has actually helped inspire art — the TV show <em>Mr. Robot</em>. Its protagonist is a hacktivist . hackers who break into computer systems to promote a cause.</p>
<p>Brown was connected to Anonymous, a group that hacked a private security firm to reveal secrets. He is now out and living in a halfway house in Dallas. He had spent years in a prison cell thinking about what he might do when he got out. And he says he is ready to change, so next time he gets involved in hacking a corporation he is able to inflict maximum damage as hackers.</p>
<p>&#8220;Certainly, I haven&#8217;t gotten any less militant in the course of having these things done to me,&#8221; Brown says.</p>
<div id="res588908564" class="bucketwrap image medium">
<div class="imagewrap" data-crop-type="">
<p><img decoding="async" class="img" src="https://media.npr.org/assets/img/2018/02/26/barrett-brown-56433572ea5378fffcaca648bfa27c9e980a346e-s400-c85.png" alt="" /></p>
<div class="enlarge-options"></div>
</div>
</div>
<div id="res588908564" class="bucketwrap image medium">
<div class="credit-caption">
<div class="caption-wrap">
<div class="caption" aria-label="Image caption">
<p>Barrett Brown served time for being part of Anonymous, a group that hacked a private security firm to reveal secrets.</p>
</div>
</div>
<p><span class="credit" aria-label="Image credit"> Courtesy of Barrett Brown </span></p>
</div>
</div>
<p>Since most hacktivists operate in the shadows, Brown offers the best look at these cyber-revolutionaries and their motivations.</p>
<p>The 36-year-old Brown was born in Dallas. His father was a wealthy real estate investor, until he was investigated by the FBI for fraud. Brown&#8217;s father was never charged, but the family lost all its money and his parents divorced.</p>
<p>&#8220;It was something that I&#8217;m sure instilled in me the idea that there was a degree of arbitrary power out there that could come down at any time and disrupt your life, as it did to me when I was a child,&#8221; Brown says.</p>
<p>He hates arbitrary power and always has. He is an anarchist who believes the U.S. government is fundamentally corrupt. And he says most Americans are too complacent to do anything about it.</p>
<aside id="ad-backstage-wrap" aria-label="advertisement"></aside>
<aside id="ad-mobilebackfill-wrap" aria-label="advertisement"></aside>
<div id="res588816572" class="bucketwrap internallink insettwocolumn inset2col ">
<div class="bucket img">
<p><a id="featuredStackSquareImage583682937" href="https://www.npr.org/sections/alltechconsidered/2018/02/20/583682937/the-father-of-the-internet-sees-his-invention-reflected-back-through-a-black-mir" data-metrics="{&quot;category&quot;:&quot;Story to Story&quot;,&quot;action&quot;:&quot;Click Internal Link&quot;,&quot;label&quot;:&quot;https:\/\/www.npr.org\/sections\/alltechconsidered\/2018\/02\/20\/583682937\/the-father-of-the-internet-sees-his-invention-reflected-back-through-a-black-mir&quot;}"><img decoding="async" class="img" src="https://media.npr.org/assets/img/2018/02/06/jenn-liv-opener_sq-1b4db436ad72d496ba8c4a5981498f7615750c40-s400-c85.png" alt="The Father Of The Internet Sees His Invention Reflected Back Through A 'Black Mirror'" /></a></p>
<div class="bucketblock">
<h3 class="slug"><a href="https://www.npr.org/sections/alltechconsidered/">All Tech Considered </a></h3>
<h3><a href="https://www.npr.org/sections/alltechconsidered/2018/02/20/583682937/the-father-of-the-internet-sees-his-invention-reflected-back-through-a-black-mir" data-metrics="{&quot;category&quot;:&quot;Story to Story&quot;,&quot;action&quot;:&quot;Click Internal Link&quot;,&quot;label&quot;:&quot;https:\/\/www.npr.org\/sections\/alltechconsidered\/2018\/02\/20\/583682937\/the-father-of-the-internet-sees-his-invention-reflected-back-through-a-black-mir&quot;}">The Father Of The Internet Sees His Invention Reflected Back Through A &#8216;Black Mirror&#8217;</a></h3>
</div>
</div>
</div>
<p>&#8220;That&#8217;s what &#8230; in part brings me to contempt for the American citizenry,&#8221; he says. &#8220;Obviously, I have no respect for the laws, for the government or for the voters.&#8221;</p>
<p>Instead, he says, his own code of values drives him.</p>
<p>He became a radical intellectual — more interested in spreading revolutionary ideas than in protesting in the streets. But in 2006, Brown saw a potential outlet for his anarchist dreams — the hacktivist group Anonymous. It was leaderless, crowdsourced and militant.</p>
<p>Anonymous managed to organize a massive attack on Scientology, even taking down its website. Brown started covering Anonymous as a journalist but soon became deeply involved.</p>
<div id="res588816570" class="bucketwrap internallink insettwocolumn inset2col ">
<div class="bucket img">
<p><a id="featuredStackSquareImage585535355" href="https://www.npr.org/sections/alltechconsidered/2018/02/20/585535355/artists-and-criminals-on-the-cutting-edge-of-tech" data-metrics="{&quot;category&quot;:&quot;Story to Story&quot;,&quot;action&quot;:&quot;Click Internal Link&quot;,&quot;label&quot;:&quot;https:\/\/www.npr.org\/sections\/alltechconsidered\/2018\/02\/20\/585535355\/artists-and-criminals-on-the-cutting-edge-of-tech&quot;}"><img decoding="async" class="img" src="https://media.npr.org/assets/img/2018/02/15/gettyimages-165010776_sq-3ff6f7c4b1b605f8508125523eb2bfe757c5d927-s400-c85.jpg" alt="Artists And Criminals: On The Cutting Edge Of Tech" /></a></p>
<div class="bucketblock">
<h3 class="slug"><a href="https://www.npr.org/sections/alltechconsidered/">All Tech Considered </a></h3>
<h3><a href="https://www.npr.org/sections/alltechconsidered/2018/02/20/585535355/artists-and-criminals-on-the-cutting-edge-of-tech" data-metrics="{&quot;category&quot;:&quot;Story to Story&quot;,&quot;action&quot;:&quot;Click Internal Link&quot;,&quot;label&quot;:&quot;https:\/\/www.npr.org\/sections\/alltechconsidered\/2018\/02\/20\/585535355\/artists-and-criminals-on-the-cutting-edge-of-tech&quot;}">Artists And Criminals Hackers: On The Cutting Edge Of Tech</a></h3>
</div>
</div>
</div>
<p>&#8220;I saw this as the very first ripples in something that would grow to be one of the great dynamics of the 21st century, that we would see more of this emergence [of] online warfare essentially against institutions including nation-states,&#8221; he says.</p>
<p>For many years, Brown was a sort of unofficial spokesman for Anonymous, appearing in interviews dressed in a beige corduroy or navy blue jacket and dress shirt, a cigarette dangling from his hand. He looked more like a preppy than a revolutionary.</p>
<p>In 2011, the group began targeting companies that contracted with the U.S. government. One of them was Stratfor — a global intelligence firm. Emails released after an Anonymous hack included sensitive information on top-secret government missions like the killing of Osama bin Laden. The emails also show Dow Chemical hired Stratfor to spy on activists trying to get money for families who suffered during the Bhopal disaster.</p>
<p>Brown viewed this as a private corporate version of COINTELPRO — the FBI&#8217;s effort in the 1960s to discredit activists like Martin Luther King Jr.</p>
<p>Brown created Project PM, an online chatroom where participants looked through thousands of hacked emails to find the most incriminating. One email contained thousands of credit card numbers — and stealing credit cards is a crime.</p>
<p>In September 2012, Brown was at home talking online with members of Project PM. &#8220;I heard a rustling at my door and I walked over to the door. I was holding a beer in my hand,&#8221; he says. &#8220;[I] thought it was another friend of mine.&#8221;</p>
<div id="res588816556" class="bucketwrap internallink insettwocolumn inset2col ">
<div class="bucket img">
<p><a id="featuredStackSquareImage583682220" href="https://www.npr.org/sections/alltechconsidered/2018/02/23/583682220/this-gray-hat-hacker-breaks-into-your-car-to-prove-a-point" data-metrics="{&quot;category&quot;:&quot;Story to Story&quot;,&quot;action&quot;:&quot;Click Internal Link&quot;,&quot;label&quot;:&quot;https:\/\/www.npr.org\/sections\/alltechconsidered\/2018\/02\/23\/583682220\/this-gray-hat-hacker-breaks-into-your-car-to-prove-a-point&quot;}"><img loading="lazy" decoding="async" class="img alignnone" src="https://media.npr.org/assets/img/2018/02/06/jenn-liv-car-hacker_sq-ad71924c47eb7266eac4fe7ad4c354c39826e1cd-s400-c85.png" alt="This 'Gray Hat' Hackers Breaks Into Your Car — To Prove A Point" width="400" height="400" /></a></p>
<div class="bucketblock">
<h3 class="slug"><a href="https://www.npr.org/sections/alltechconsidered/">All Tech Considered </a></h3>
<h3><a href="https://www.npr.org/sections/alltechconsidered/2018/02/23/583682220/this-gray-hat-hacker-breaks-into-your-car-to-prove-a-point" data-metrics="{&quot;category&quot;:&quot;Story to Story&quot;,&quot;action&quot;:&quot;Click Internal Link&quot;,&quot;label&quot;:&quot;https:\/\/www.npr.org\/sections\/alltechconsidered\/2018\/02\/23\/583682220\/this-gray-hat-hacker-breaks-into-your-car-to-prove-a-point&quot;}">This &#8216;Gray Hat&#8217; Hacker Breaks Into Your Car — To Prove A Point</a></h3>
</div>
</div>
</div>
<p>But when he opened the door there was a SWAT team equipped with shields and helmets. Brown says they were yelling, &#8220;Put your hands up buddy.&#8221; Brown says they had him on the floor and put a boot on his back. The audio of the arrest was recorded by someone in the Project PM chatroom.</p>
<p>Brown faced up to 100 years in prison. His mother was charged with hiding his laptops.</p>
<p>Brown admits he went a bit off the rails. He posted a video on YouTube attacking an FBI agent.</p>
<p>&#8220;I was a former heroin addict,&#8221; Brown says. &#8220;I was getting off Suboxone at the time, which is a synthetic opiate. And I was sort of suddenly feeling emotions again that have been kind of bottled, kept down a few months. I was very upset about my mother being threatened with indictment.&#8221;</p>
<p>Still, Brown was a cause célèbre among certain activists and journalists. Many felt he was being put away for simply looking through hacked emails — something any journalist would do.</p>
<div id="res588817303" class="bucketwrap internallink insettwocolumn inset2col ">
<div class="bucket img">
<p><a id="featuredStackSquareImage140539560" href="https://www.npr.org/2011/09/16/140539560/anonymous-comes-out-in-the-open" data-metrics="{&quot;category&quot;:&quot;Story to Story&quot;,&quot;action&quot;:&quot;Click Internal Link&quot;,&quot;label&quot;:&quot;https:\/\/www.npr.org\/2011\/09\/16\/140539560\/anonymous-comes-out-in-the-open&quot;}"><img loading="lazy" decoding="async" class="img alignnone" src="https://media.npr.org/assets/img/2011/09/16/anonymousmask_sq-30a8637783609a67771c991d728dafb1957c7b62-s400-c85.jpg" alt="Hackers, Anonymous Comes Out In The Open" width="400" height="400" /></a></p>
<div class="bucketblock">
<h3 class="slug"><a href="https://www.npr.org/sections/technology/">Technology </a></h3>
<h3><a href="https://www.npr.org/2011/09/16/140539560/anonymous-comes-out-in-the-open" data-metrics="{&quot;category&quot;:&quot;Story to Story&quot;,&quot;action&quot;:&quot;Click Internal Link&quot;,&quot;label&quot;:&quot;https:\/\/www.npr.org\/2011\/09\/16\/140539560\/anonymous-comes-out-in-the-open&quot;}">Anonymous Comes Out In The Open</a></h3>
</div>
</div>
</div>
<p>Brown eventually pleaded guilty to threatening a federal officer and to two other charges. The government imprisoned other members of Anonymous. The group kind of faded away, but its tactics did not.</p>
<p>During the 2016 election, Russian state-supported hackers used some of the same tools as Anonymous — hacking emails from the Democratic National Committee and posting them on WikiLeaks to embarrass Hillary Clinton.</p>
<p>I wondered, is there really any difference between a foreign agent trying to undermine our democracy and hacktivists like Anonymous? Is Brown a hero or a villain?</p>
<p>I turned to an unlikely expert to help me figure that out — Sam Esmail, the creator of the TV show <em>Mr. Robot</em>. &#8220;Their spirit is in activism,&#8221; Esmail says. &#8220;Their spirit is in exposing these frauds and abuses by people in power. And that&#8217;s just something on a human level I respect.&#8221;</p>
<p>But <em>Mr. Robot</em> is hardly a glowing portrait of hacktivists/hackers. Its hero, Elliot, is a drug addict who can&#8217;t access his own emotions. Sound familiar? Elliot leads a group called society that takes down the world&#8217;s largest corporation — erasing everyone&#8217;s debt. Chaos erupts.</p>
<div id="res588360973" class="bucketwrap image large">
<div class="imagewrap" data-crop-type="">
<div style="width: 810px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="img" src="https://media.npr.org/assets/img/2018/02/23/gettyimages-505442564_custom-36c7f162449dfd1b86bf31f0d7514bd6dee170c9-s800-c85.jpg" alt="Mr. Robot actor Rami Malek (from left), writer/producer Sam Esmail and actor Christian Slater" width="800" height="550" /><p class="wp-caption-text">Mr. Robot actor Rami Malek (from left), writer/producer Sam Esmail and actor Christian Slater</p></div>
</div>
<div class="credit-caption">
<div class="caption-wrap">
<div class="caption" aria-label="Image caption">
<p><em>Mr. Robot</em> actor Rami Malek (from left), writer/producer Sam Esmail and actor Christian Slater, at the Critics&#8217; Choice Awards in Santa Monica, Calif., in 2016. &#8220;Their spirit&#8217;s in exposing these frauds and abuses by people in power,&#8221; Esmail says of hacktivists. &#8220;And that&#8217;s just something on a human level I respect.&#8221;</p>
</div>
</div>
<p><span class="credit" aria-label="Image credit"> Jason Merritt/Getty Images </span></p>
</div>
</div>
<p>Esmail says he is looking at an age-old dilemma. &#8220;Do we commit a criminal/ hackers act for something that we feel is just, even though the consequences could be great?&#8221; he says. &#8220;That&#8217;s such a kind of loaded, huge, but very relevant question today.&#8221;</p>
<p>Brown doesn&#8217;t seem interested in examining the moral ambiguity of hacktivist crimes. But he says he is learning from past mistakes. Ultimately, Brown feels that Anonymous was disorganized and lacked leadership.</p>
<p>So he is designing a software program called Pursuance, which he says will take hacktivism into the future. It will be fully encrypted, anyone could use it to sort through a trove of hacked documents, and it could even be used to recruit a team of hackers.</p>
<div id="res588817220" class="bucketwrap internallink insettwocolumn inset2col ">
<div class="bucket img">
<p><a id="featuredStackSquareImage415517808" href="https://www.npr.org/2015/06/21/415517808/the-human-drama-of-hacking-fuels-tv-thriller-mr-robot" data-metrics="{&quot;category&quot;:&quot;Story to Story&quot;,&quot;action&quot;:&quot;Click Internal Link&quot;,&quot;label&quot;:&quot;https:\/\/www.npr.org\/2015\/06\/21\/415517808\/the-human-drama-of-hacking-fuels-tv-thriller-mr-robot&quot;}"><img loading="lazy" decoding="async" class="img alignnone" src="https://media.npr.org/assets/img/2015/06/18/nup_166271_0115_sq-3a3e6c766fc955975877d6d05dcc83e32156399a-s400-c85.jpg" alt="Hackers , The Human Drama Of Hacking Fuels TV Thriller 'Mr. Robot'" width="366" height="366" /></a></p>
<div class="bucketblock">
<h3 class="slug"><a href="https://www.npr.org/sections/television/">Television </a></h3>
<h3><a href="https://www.npr.org/2015/06/21/415517808/the-human-drama-of-hacking-fuels-tv-thriller-mr-robot" data-metrics="{&quot;category&quot;:&quot;Story to Story&quot;,&quot;action&quot;:&quot;Click Internal Link&quot;,&quot;label&quot;:&quot;https:\/\/www.npr.org\/2015\/06\/21\/415517808\/the-human-drama-of-hacking-fuels-tv-thriller-mr-robot&quot;}">The Human Drama Of Hacking Fuels TV Thriller &#8216;Mr. Robot&#8217;</a></h3>
</div>
</div>
</div>
<p>Brown says when people tweet and post their opinions on social media it&#8217;s just &#8220;slactivism.&#8221; &#8220;The next great act of hacktivism, if it really is going to be great, it has to be an act of reaffirming the idea of civic duty,&#8221; he says. He says he wants to provide a mechanism for people who do feel that sense of civic duty to really have an impact.</p>
<p>Brown is ready to be a martyr for the cause if he has to be. He would even go back to prison.</p>
<p>&#8220;I want to be in a position to defeat my powerful adversaries in public,&#8221; he says, &#8220;where everyone could admire the pluck in which I did it.&#8221;</p>
<p>Brown is casting himself in a starring role in the new world. And in his mind, <em>Mr. Robot</em> is no fantasy. It&#8217;s what the future really looks like.</p>
<blockquote class="wp-embedded-content" data-secret="AsoE6kPtlp"><p><a href="https://www.net-security-training.co.uk/ccsp-certified-cloud-security-professional/">Official (ISC)2 CCSP Certification Training</a></p></blockquote>
<p><iframe loading="lazy" title="&#8220;Official (ISC)2 CCSP Certification Training&#8221; &#8212; Net Security Training" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  src="https://www.net-security-training.co.uk/ccsp-certified-cloud-security-professional/embed/#?secret=AsoE6kPtlp" data-secret="AsoE6kPtlp" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p>Reference: https://www.npr.org/sections/alltechconsidered/2018/02/26/583682587/how-hackers-could-cause-global-chaos-an-anarchist-explains</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Proven Cyber Security Certifications That Will Boost Your Salary in 2018</title>
		<link>https://www.net-security-training.co.uk/5-proven-cyber-security-certifications/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Mon, 26 Feb 2018 12:10:50 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[computersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Intrusion Analyst Apprenticeship]]></category>
		<category><![CDATA[cyber intrusion analyst training uk]]></category>
		<category><![CDATA[cyber network security]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber Risk apprenticeship]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security basics]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security services]]></category>
		<category><![CDATA[cyber security technologist apprenticeship]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber technologist apprenticeship]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=9354</guid>

					<description><![CDATA[Looking for which cyber security certifications you should get your hands on? Here are 5 certifications that will boost your salary in 2018. In response to the growing need for qualified cybersecurity professionals, salaries are on the rise in 2018. But to break into a rewarding cybersecurity role, you’ll need to prove your skills with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>				<strong>Looking for which cyber security certifications you should get your hands on? Here are 5 certifications that will boost your salary in 2018.</strong></p>
<p>In response to the growing need for <a href="https://www.hackread.com/5-proven-cyber-security-certifications-skyrocket-your-salary/" target="_blank" rel="noopener">qualified cybersecurity professionals</a>, salaries are on the rise in 2018. But to break into a rewarding cybersecurity role, you’ll need to prove your skills with industry-recognized certifications.</p>
<p>Cyber Security Certifications build your knowledge and prove to employers you’re as good as you say you are. Whether you’re looking for a new challenge or want to advance in your current role, gaining a new certification is an opportunity to improve your salary.</p>
<p>Using aggregate median salary data from PayScale and <a href="http://www.firebrandtraining.co.uk/" target="_blank" rel="noopener">Firebrand Training</a>’s insider industry knowledge of IT certifications, we’ve identified five Cyber Security Certifications that will boost your salary in 2018.</p>
<h4><b>1. GIAC Security Essentials (GSEC) – £70,000</b></h4>
<p>The entry-level GIAC Security Essentials is designed to prove your knowledge of core cyber security concepts and provide the technical expertise required to work in hands-on roles.</p>
<p>This certification will build your knowledge of networking concepts, defense-in-depth, internet security technologies and Windows/Linux operating system security.</p>
<p>You’ll also be on track to earning a great salary – the average monthly earnings for GSEC holders is £70,00. While it is unlikely that you’ll land this salary with just this entry-level certification, it may demonstrate that GSEC-certified professionals are committed to career development will go on to achieve top cybersecurity roles.</p>
<p>While the GSEC can be achieved through self-study, many professionals will opt for a training program that includes the exam. Otherwise, you’ll need to pay $1,699 to attempt the GIAC Security Essentials exam.</p>
<p>GIAC was founded in 1999 with the aim of validating the skills of information security professionals. The GSEC is just one of a <a href="https://www.giac.org/about/program-overview">range of certifications</a> that address a broad range of cybersecurity skills, from entry to advanced levels.</p>
<h4><b>2. (ISC)</b><b>2</b><b> CISSP – £80,000<br />
</b></h4>
<p>The <a href="https://www.net-security-training.co.uk/cissp-training/">CISSP (Certified Information Systems Security Professional)</a> is aimed at the cybersecurity elite and is a fantastic way to demonstrate your expert knowledge, advance your career and join a worldwide community of cybersecurity professionals.</p>
<p>This certification shows you have what it takes to build and manage an information security programme. As a result, the CISSP certification is highly sought-after by security professionals, especially those aiming for CCISO (Chief Information Security Officer) roles.</p>
<p>To achieve the CISSP, you’ll need at least five years’ cumulative work experience across two or more of the eight CISSP domains – which cover cybersecurity topics like, risk management, software development security, and security operations. You’ll then need to pass an exam to gain the certification.</p>
<p>A major driver for professionals to achieve the CISSP is to improve their marketability. With an average salary of £80,000 for CISSP holders, it’s easy to see why.</p>
<h4><b>3. ISACA CISA – £80,000<br />
</b></h4>
<p>Since it was introduced by ISACA in 1978, more than 129,000 professionals have proved their skills with the CISA certification.</p>
<p>Earning the CISA showcases your information security auditing knowledge and demonstrates your ability to assess vulnerabilities, report on compliance and institute security controls within an enterprise.</p>
<p>Achieving the CISA is often seen as mandatory to work as an Information Security Auditor. As security demands create fresh challenges for businesses, employers continue to recognize the credibility provided by the CISA.</p>
<h4><b>4. (ISC)</b><b>2</b><b> CCSP – £83,000<br />
</b></h4>
<p>Within two years, 41% of enterprises will be running business-critical IT services in hybrid, public and private clouds, data from Traditional IT revealed.</p>
<p>Because of this greater reliance on cloud technology, the need for professionals with proven cloud skills is increasing.</p>
<p><a href="https://www.net-security-training.co.uk/ccsp-certified-cloud-security-professional/">(ISC)2’s CCSP (Certified Cloud Security Professional)</a> is one of the leading cloud credentials and is a perfect benchmark for security professionals. A result of the unique partnership between (ISC)2 and the Cloud Security Alliance (CSA), the CCSP is ideal for experienced security professionals looking to move into cloud-focused roles or expand their existing skillset.</p>
<p>By achieving the CCSP, you’ll prove your expert knowledge of cloud application, data, and infrastructure security. You’ll also build your knowledge of cloud compliance, legality and privacy.</p>
<p>This high-level certification builds on knowledge gained through the CISSP. CISSP-holders will be pre-qualified to sit the CCSP exam, otherwise, you’ll need five years of relevant security work experience.</p>
<h4><b>5. ISACA CISM – £80,000</b></h4>
<p><a href="https://www.net-security-training.co.uk/cism-training/">The Certified Information Security Manager (CISM)</a> offered by ISACA is highly-regarded in the cybersecurity industry as a managerial certification that also builds technical knowledge. There’s growing recognition for this expert-level certification, due in no small part to the success of the CISA certification, also offered by ISACA.</p>
<p>This certification is ideal for technical cybersecurity professionals that want to make the move into management and gain recognition of their managerial and communication skills. When preparing to pass the CISM exam, you’ll need to study governance, risk management, incident management and security program development.</p>
<p>While there is some overlap between the CISSP and CISM certifications, the CISSP is more technically focused.</p>
<p>To sit the CISM exam, you’ll need five years of relevant work experience, with a minimum of three years’ information security management experience. However, you will be able to substitute years’ experience with other security certifications, like the CISSP, CISA or GIAC certification.</p>
<h4><b>More cyber security certifications that pay</b></h4>
<p>With hundreds of cyber security certifications on the market, they couldn’t all be squeezed into this shortlist. That said, we’d like to give some honorable mentions to certifications that didn’t make the top five.</p>
<p>To build knowledge of the tools and techniques used by cybercriminals, consider taking an <a href="http://www.firebrandtraining.co.uk/courses/ec_council/ceh/hacking.asp">ethical hacking course</a> and achieving EC-Council’s Certified Ethical Hacker certification. With an average salary of $79,000, this entry-to-intermediate certification is one to consider.</p>
<p>If you’re a networking professional looking to specialize in the security of Cisco certifications, the Cisco CCNA Security is ideal. You’ll prove your ability to develop security infrastructure and vulnerabilities on networks and set yourself up for a £60,000 salary.</p>
<p>Reference: https://www.hackread.com/5-proven-cyber-security-certifications-that-will-boost-your-salary-in-2018/		</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>cybersecurity skills need for  Business leaders</title>
		<link>https://www.net-security-training.co.uk/business-leaders-cybersecurity-skills/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 21 Feb 2018 10:55:58 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[computersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Intrusion Analyst Apprenticeship]]></category>
		<category><![CDATA[cyber intrusion analyst training uk]]></category>
		<category><![CDATA[cyber network security]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber Risk apprenticeship]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security basics]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security services]]></category>
		<category><![CDATA[cyber security technologist apprenticeship]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber technologist apprenticeship]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=9222</guid>

					<description><![CDATA[New research shows corporate demand for cybersecurity skills is rising faster than internal supply, with innovative thinking needed to plug the gap &#8211; both in the acquisition and retention of key talent  NEW YORK, Feb. 21, 2018 /PRNewswire/ &#8212; A new report by Capgemini&#8216;s Digital Transformation Institute highlights an urgent and growing cybersecurity skills gap, calling [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>New research shows corporate demand for cybersecurity skills is rising faster than internal supply, with innovative thinking needed to plug the gap &#8211; both in the acquisition and retention of key talent </em></p>
<header class="container release-header"></header>
<section class="release-body container no-margin-bottom ">
<div class="row">
<div class="col-sm-10 col-sm-offset-1">
<p><span class="xn-location">NEW YORK</span>, <span class="xn-chron">Feb. 21, 2018</span> /PRNewswire/ &#8212; A new report by <a class="linkOnClick" href="https://www.capgemini.com/resources/digital-talent-gap/?utm_source=pr&amp;utm_medium=referral&amp;utm_content=dt_none_link_report_digital_talent&amp;utm_campaign=disruptdigital_dti" target="_blank" rel="nofollow noopener noreferrer" data-include="300601585">Capgemini</a>&#8216;s Digital Transformation Institute highlights an urgent and growing cybersecurity skills gap, calling for new recruitment and retention strategies to help organizations contain cyber risks and build competitive advantage. The report, <a class="linkOnClick" href="https://www.capgemini.com/news/business-leaders-report-urgent-need-for-cybersecurity-skills-as-digital-talent-gap-widens?utm_source=pr&amp;utm_medium=social&amp;utm_content=cybersecurity_none_link_pressrelease_none&amp;utm_campaign=secureassets_security_talentgap" target="_blank" rel="nofollow noopener noreferrer" data-include="300601585">Cybersecurity Talent: The Big Gap in Cyber Protection</a>, demonstrates that of all the digital skills necessary for organizations with aspirations of digital leadership, cybersecurity represents the biggest gap between demand for those skills and internal supply.</p>
</div>
</div>
<div class="row"></div>
<div class="row">
<div class="col-sm-10 col-sm-offset-1">
<p>The report surveyed more than 1,200 senior executives and front-line employees and analyzed social media sentiment of more than 8,000 cybersecurity employees. Sixty-eight percent of organizations reported high demand for cybersecurity skills compared to 61 percent demanding innovation skills and 64 percent analytics skills. Demand for these skills was then set against the availability of proficient skills already present in the organization. This identified a 25 percentage point gap for cybersecurity skills (with 43 percent availability of proficient skills already present in the organization), compared to a 13 percentage point gap for analytics (51 percent already present) and a 21 percentage point gap for innovation (40 percent already present).</p>
<p><i>&#8220;The cybersecurity skills gap has a very real effect on organizations in every sector,&#8221;</i> said <a class="linkOnClick" href="https://www.capgemini.com/experts/cybersecurity/mike-turner/" target="_blank" rel="nofollow noopener noreferrer" data-include="300601585"><span class="xn-person">Mike Turner</span></a>, Chief Operating Officer of Capgemini&#8217;s Cybersecurity Global Service Line. <i>&#8220;Spending months rather than weeks looking for suitable candidates is not only inefficient, it also leaves organizations dangerously exposed to rising incidents of cybercrime. Business leaders must urgently rethink how they recruit and retain talent, particularly if they wish to maximize the benefits from investment in digital transformation.&#8221;</i></p>
<p>The demand for precious cybersecurity skills talent is projected to grow over the next 2-3 years with 72 percent of respondents predicting high demand for cybersecurity in 2020, compared to 68 percent today. Set against increasing incidents of cyberattacks and the need for organizations to not only protect themselves but also maximize competitive advantage from digitization, the report recommends a series of tactical priorities for business leaders.</p>
<p><b>Priority 1 – integrate security<br />
</b>The first priority for companies is to assess how well security is integrated across the organization. What is the culture of cybersecurity outside the team with direct responsibility for keeping data protected? How security-savvy are app developers and network managers?</p>
<p><i>&#8220;It&#8217;s important to make the organization as a whole better at cybersecurity, aligning the enterprise with principles and processes that are secure from the ground up,&#8221;</i> explains Turner. <i>&#8220;Get the basics right, in terms of application development.  Develop secure code. Make your network engineers and cloud architects better at securing the cloud. That&#8217;s a good way to fight the skills gap, because it teaches the organization to be secure by design.&#8221;</i></p>
<p><b>Priority 2 – maximize existing skillsets<br />
</b><i>&#8220;Another priority is to look at the, as yet, unrecognized cybersecurity skills that lie within,&#8221; </i>said Turner.<i> &#8220;Half of all employees are already investing their own resources to develop digital skills<sup>1</sup>, showing an appetite to upskill. Organizations that struggle to recruit externally may be able to uncover candidates with adaptable skillsets who can be trained. Those functions with complementary and transferable skills include network operations, database administration and application development.&#8221;</i></p>
<p>In addition, companies should look at the requirement to embed security into every service and application, and hire business communicators to complement the technical skills in their team. Business analysts and technical marketers could be transferred to cybersecurity roles to enable the company-wide adoption of best practices.</p>
<p><b>Priority 3 – think outside the box<br />
</b>A third priority is for organizations to think beyond the normal recruitment strategies and understand the root skills of cybersecurity. Look at traits and skills present in completely different job roles and interview candidates the organization might not usually consider. Those currently in math roles for example, are often highly skilled at pattern recognition.</p>
<p><i>&#8220;Thinking outside the box is about understanding the transferable skills,&#8221; </i>adds Turner<i>. &#8220;For example, people on the autism spectrum are fantastic at pattern spotting and are often blessed with numerical and problem-solving skills, attention to detail and a methodical approach to work – all useful traits for cybersecurity best practice.&#8221;</i></p>
<p><b>Priority 4 – strengthen retention<br />
</b>The final report recommendation looks at retention of talent. In a highly competitive recruitment market, organizations must also look at engagement of existing employees to ensure talent gaps don&#8217;t worsen.</p>
<p>The report reveals that cybersecurity employees value organizations that offer flexible working arrangements, encourage training, and prioritize clear and accessible career progression. Within the new report, a difficult work-life balance was discussed as one of the five worst aspects of the job by cybersecurity professionals on social media and a main reason why they leave or remain dissatisfied with their company.</p>
<p>The clear majority (81 percent) of cybersecurity talent agreed with the statement, <i>&#8220;I prefer joining organizations where I have a clear career development path,&#8221;</i> compared to 62 percent of all respondents in our survey. The number is even higher (84 percent) for Gen Y and Gen Z employees<sup>2</sup>, who highlighted a lack of career progression as their number one concern. Managing these softer but equally important retention issues is a key requirement for building a viable and sustainable cybersecurity offering.</p>
<p><b>Research Methodology<br />
</b>Capgemini Digital Transformation Institute surveyed 753 employees and 501 executives at the director level or above, at large companies with reported revenue of more than <span class="xn-money">$500 million</span> for FY 2016 and more than 1,000 employees. The survey took place from June to <span class="xn-chron">July 2017</span>, and covered nine countries – <span class="xn-location">France</span>, <span class="xn-location">Germany</span>, <span class="xn-location">India</span>, <span class="xn-location">Italy</span>, <span class="xn-location">the Netherlands</span>, <span class="xn-location">Spain</span>, <span class="xn-location">Sweden</span>, the <span class="xn-location">United Kingdom</span> and <span class="xn-location">the United States</span> and seven industries – Automotive, Banking, Consumer Products, Insurance, Retail, Telecom and Utilities.</p>
<p>Capgemini also conducted interviews with recruiters from global firms, cybersecurity associations and academics to understand best practices to mitigate the cybersecurity talent gap. Lastly, Capgemini analyzed the sentiments of around 8,400 current and former employees at 53 cybersecurity firms with at least 100 employees on social media. Selected firms operate primarily in the cybersecurity space covering (but not limited to) data security, cloud security, mobile security, enterprise security, email security, and application security.</p>
<p>A copy of the report can be downloaded <a class="linkOnClick" href="https://goo.gl/pHz9Dw" target="_blank" rel="nofollow noopener noreferrer" data-include="300601585">here</a>.</p>
<p><b>About Capgemini<br />
</b>A global leader in consulting, technology services and digital transformation, Capgemini is at the forefront of innovation to address the entire breadth of clients&#8217; opportunities in the evolving world of cloud, digital and platforms. Building on its strong 50-year heritage and deep industry-specific expertise, Capgemini enables organizations to realize their business ambitions through an array of services from strategy to operations. Capgemini is driven by the conviction that the business value of technology comes from and through people. It is a multicultural company of 200,000 team members in over 40 countries. The Group reported 2017 global revenues of <span class="xn-money">EUR 12.8 billion</span>.</p>
<p>Reference: https://www.prnewswire.com/news-releases/business-leaders-report-urgent-need-for-cybersecurity-skills-as-digital-talent-gap-widens-300601585.html</p>
</div>
</div>
</section>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Over 50% of businesses increased their cyber-security budget amid attacks</title>
		<link>https://www.net-security-training.co.uk/cyber-security-budget-amid-attacks/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 20 Feb 2018 11:01:22 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[computersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Intrusion Analyst Apprenticeship]]></category>
		<category><![CDATA[cyber intrusion analyst training uk]]></category>
		<category><![CDATA[cyber network security]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber Risk apprenticeship]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security basics]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security services]]></category>
		<category><![CDATA[cyber security technologist apprenticeship]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber technologist apprenticeship]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=9143</guid>

					<description><![CDATA[According to a recent report, 53% of businesses say their cyber-security budget has increased over the last year due to an increase in cyber-attacks . In an age of technology, cyber-attacks are becoming more prevalent, more frequent and more threatening than ever before. As a result, Turnerlittle.com sought to find out how cyber-security threats have [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="attachment_9144" style="width: 706px" class="wp-caption alignnone"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-9144" class="wp-image-9144 size-full" title="cyber-security" src="https://www.net-security-training.co.uk/wp-content/uploads/2018/02/dreamstime_s_94305229-696x464.jpg" alt="cyber-security " width="696" height="464" /><p id="caption-attachment-9144" class="wp-caption-text">cyber-security</p></div>
<p>According to a recent report, 53% of businesses say their cyber-security budget has increased over the last year due to an increase in cyber-attacks . In an age of technology, <a href="https://www.openaccessgovernment.org/cyber-security-biggest-digital-risk/40719/">cyber-attacks are becoming more prevalent, more frequent and more threatening than ever before.</a></p>
<p>As a result,<a href="https://www.turnerlittle.com/"> Turnerlittle.com</a> sought to find out how cyber-security threats have increased in recent years, and<a href="https://www.openaccessgovernment.org/cyber-security-concerns-all-of-us/38727/"> what companies are, and should, be doing to prevent cyber-attacks</a>.</p>
<p>In a recent Ernst &amp; Young (EY) report, Turner Little found that more than half of respondents (53%) say their cyber security budget has increased over the last year.</p>
<h3>cyber-security is a number 1 priority for businesses</h3>
<p>In 2018, many companies understand that cyber-security is a major risk, perhaps even the number one priority; particularly for technology-heavy companies, but <a href="https://www.openaccessgovernment.org/maintaining-cyber-security/35659/">unfortunately, no business can completely protect itself from a cyber-attack. However, they can implement plans and strategies to help prevent breaches from occurring.</a></p>
<p>For many companies, customer data is paramount, with a staggering 65% of businesses citing customer personal and identifiable information as the most valuable asset to protect, while 36% cited customer passwords.</p>
<p>These were followed by:</p>
<ul>
<li>Company financial information- 19.5%</li>
<li>Corporate strategic plans- 18.4%</li>
<li>Senior executive/board member personal information- 15.1%</li>
<li>Information exchanged during M&amp;A activities- 11.5%</li>
<li>Patented intellectual property (IP)- 10.1%</li>
<li>R&amp;D information- 9.6%</li>
<li>Non-patented IP- 8.3%</li>
<li>Supplier/vendor identifiable information- 4.2%</li>
</ul>
<p>Turner Little found<a href="https://www.openaccessgovernment.org/uk-education-sector-to-prioritise-cybersecurity-in-schools/40170/"> there is a shortage of individuals with the skills and know-how to deal with cyber security threats in business.</a></p>
<p>Companies must increase cyber-security awareness training, whilst instilling an understanding of how cyber risks can impact different roles and individual projects, as well as harming overall businesses.</p>
<p>Analysing a 2017 report by Gov.uk, Turner Little found that, over the last 12 months, <a href="https://www.openaccessgovernment.org/study-cyber-security-courses-warwick-university/30634/">some businesses are trying to offer cyber security training.</a></p>
<p>The following companies pursuing cyber-security training:</p>
<ul>
<li>Small firms- 25%</li>
<li>Medium firms- 43%</li>
<li>Large firms- 63%</li>
<li>Within finance/insurance- 49%</li>
<li>Within info/communications/utilities- 41%</li>
</ul>
<h3>Costs of a cyber breach</h3>
<p>The mean spend on cyber-security of all businesses in the UK is £4,590, and for large businesses, the mean spend reaches a staggering £387,000.</p>
<p>However, it is worth it in the long run, as Turner Little found that the average cost of breaches to all businesses in the UK reached £1,570 in the last 12 months – and £19,600 for large firms.</p>
<p>James Turner, Managing Director of Turner Little commented: “Cyber security is something every business must be Investing in. In this day and age, with the increases in technology and software, businesses are constantly under attack from hackers – both big and small. It is vital companies assess their cyber-security plans continuously to ensure all data is secure.</p>
<p>“Despite the cost, it is important to ensure that all employees understand how dangerous cyber breaches can be, and what their costs are – particularly in larger firms where the aftermath can be highly detrimental to the company’s reputation and client retention.”</p>
<p>Reference :https://www.openaccessgovernment.org/over-50-of-businesses-increased-their-cyber-security-budget-amid-attacks/42807/		</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Pros and Cons of working in the world of Net security.</title>
		<link>https://www.net-security-training.co.uk/pros-cons-working-world-net-security/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Fri, 15 Dec 2017 15:28:23 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[computersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Intrusion Analyst Apprenticeship]]></category>
		<category><![CDATA[cyber intrusion analyst training uk]]></category>
		<category><![CDATA[cyber network security]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber Risk apprenticeship]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security basics]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security services]]></category>
		<category><![CDATA[cyber security technologist apprenticeship]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber technologist apprenticeship]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=7312</guid>

					<description><![CDATA[Looking for a job to enter the world of Net security but not sure how it’ll be or if it’s what you’re looking for? Here’s everything you need to know about the good, the bad and the ugly before you jump into the Net security landscape. 1)      Now you can see this as a good [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><!-- [if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--></p>
<p class="MsoNormal"><span style="font-size: 12.0pt; mso-bidi-font-size: 11.0pt; line-height: 107%;">Looking for a job to enter the world of Net security but not sure how it’ll be or if it’s what you’re looking for? Here’s everything you need to know about the good, the bad and the ugly before you jump into the Net security landscape. </span></p>
<p class="MsoListParagraphCxSpFirst" style="text-indent: -18.0pt; mso-list: l0 level1 lfo1;"><span style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">1)<span style="font: 7.0pt 'Times New Roman';">      </span></span></span><span style="font-size: 12.0pt; line-height: 107%;">Now you can see this as a good or bad thing but there is non-stop simulation, you’re constantly having to learn new things as technology is in an ever constant state of change but so are the threats that come with it. It’s a continuous battle of intelligence and wits with hackers and attackers so you have to make sure that you keep up to date <span style="background: white;">with the latest technical developments and then be creative in coming up with innovative solutions to combat the latest threats. For a lot of people, this is great, it means you’re always learning something new and it never gets stale and you constantly have a skill you can improve, although some people may see this as tedious and may not see the appeal. </span></span></p>
<p class="MsoListParagraphCxSpMiddle" style="text-indent: -18.0pt; mso-list: l0 level1 lfo1;"><span style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">2)<span style="font: 7.0pt 'Times New Roman';">      </span></span></span><span style="font-size: 12.0pt; line-height: 107%;">One frustrating aspect is that sometimes you may get work with companies that are too old-fashioned to fully take on your advice, whether out of ignorance or purely because they just don’t see the significance of it. They might see the whole concept of cyber security as just needing to get the newest software and then installing a basic firewall to protect themselves as opposed to the huge variety of actions they could be taking in order to shield themselves from attacks. So be prepared to explain the significance of protection in a way, people, not as versed in cyber security will understand in order to get your point across. </span></p>
<p class="MsoListParagraphCxSpMiddle" style="text-indent: -18.0pt; mso-list: l0 level1 lfo1;"><span style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">3)<span style="font: 7.0pt 'Times New Roman';">      </span></span></span><span style="font-size: 12.0pt; line-height: 107%;">Another highlight of working in Net security is that the industry tends to work together, even if working for rival companies everyone is working under the same risks and threats, this means that they’re mostly all prepared to share information and details in order to keep everyone safe as there is little to no advantage in going solo and not working together to make security better overall for all. </span></p>
<p class="MsoListParagraphCxSpMiddle" style="text-indent: -18.0pt; mso-list: l0 level1 lfo1;"><span style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">4)<span style="font: 7.0pt 'Times New Roman';">      </span></span></span><span style="font-size: 12.0pt; line-height: 107%;">At last the ugly side of it, a lot of the time working in an important role in a Net security job can unfortunately just be stressful. There is a lot of planning and effort that goes into each and every problem solved and you constantly have to be on the watch for threats which can sometimes mean longer work hours and some trial and error (mainly error) but if you’ve got the passion or the knowledge for it then these are really only minor annoyances when compared to the many benefits of working in Net security. <span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span></span></p>
<p><span style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">5)<span style="font: 7.0pt 'Times New Roman';">      </span></span></span><span style="font-size: 12.0pt; line-height: 107%;">And lastly, probably the most important of the good that a Net security job has to offer…. the pay is usually great. The average security consultant reports earnings of between </span><span style="mso-bidi-font-family: Arial; background: white;">£52,500 &#8211; £82,500</span><span style="font-family: 'Arial','sans-serif'; background: white;"> per year and after hearing that the bad and the ugly don’t seem that important anymore. </span></p>
<p class="MsoListParagraphCxSpLast"><span style="font-size: 12.0pt; line-height: 107%;"> </span><span style="font-size: 12.0pt; line-height: 107%;">Well if after all this you’re still interested or maybe even more eager to start a career in Net security then why not start your training with Net Security Training today by signing up for one of our various amounts of courses. </span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ethical hackers to boost NHS cyber-defences</title>
		<link>https://www.net-security-training.co.uk/ethical-hackers-boost-nhs-cyber-defences/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 28 Nov 2017 09:17:17 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[computersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Intrusion Analyst Apprenticeship]]></category>
		<category><![CDATA[cyber intrusion analyst training uk]]></category>
		<category><![CDATA[cyber network security]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber Risk apprenticeship]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security basics]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security services]]></category>
		<category><![CDATA[cyber security technologist apprenticeship]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber technologist apprenticeship]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=6661</guid>

					<description><![CDATA[The NHS is spending £20m to set up a security operations center that will oversee the health service&#8217;s digital defenses. It will employ &#8220;ethical hackers&#8221; to look for weaknesses in health computer networks, not just react to breaches. Such hackers use the same tactics seen in cyber-attacks to help organizations spot weak points. In May, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>				The NHS is spending £20m to set up a security operations center that will oversee the health service&#8217;s digital defenses. It will employ &#8220;ethical hackers&#8221; to look for weaknesses in health computer networks, not just react to breaches. Such hackers use the same tactics seen in cyber-attacks to help organizations spot weak points.</p>
<p>In May, one-third of UK health trusts were hit by the WannaCry worm, which demanded cash to unlock infected PCs  Ethical hackers. In a statement, Dan Taylor, head of the data security center at NHS Digital, said the center would create and run a &#8220;near-real-time monitoring and alerting service that covers the whole health and care system&#8221;. The center would also help the NHS improve its &#8220;ability to anticipate future vulnerabilities while supporting health and care in re-mediating current known threats&#8221;, he said. The operations center guidance would complement the existing teams the NHS used to defend itself against cyber-threats.</p>
<p>NHS Digital, the IT arm of the health service, has issued an invitation to tender to find a partner to help run the project and advise it about the mix of expertise is required. Kevin Beaumont, a security vulnerability manager, welcomed the plan to set up the center.</p>
<p>Many private sector organizations already have similar central teams that use threat intelligence and analysis to keep networks secure.&#8221;Having a function like this is essential in modern-day organizations,&#8221; Mr. Beaumont said.</p>
<p>&#8220;In an event like WannaCry, the center could help hospitals know where they are getting infected from in real time, which was a big issue at the time, organizations were unsure how they were being infected&#8221;.</p>
<p>In October, the UK&#8217;s National Audit Office said NHS trusts had been caught out by the WannaCry worm because they had failed to follow recommended cyber-security policies.</p>
<p>The NAO report said NHS trusts had not acted on critical alerts from NHS Digital or on warnings from 2014 that had urged users to patch or migrate away from vulnerable older software By Ethical hackers.</p>
<p>Reference: BBC News		</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cash Converters reveals customer data breach</title>
		<link>https://www.net-security-training.co.uk/cash-converters-reveals-customer-data/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Fri, 17 Nov 2017 08:46:19 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[computersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Intrusion Analyst Apprenticeship]]></category>
		<category><![CDATA[cyber intrusion analyst training uk]]></category>
		<category><![CDATA[cyber network security]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber Risk apprenticeship]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security basics]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security services]]></category>
		<category><![CDATA[cyber security technologist apprenticeship]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber technologist apprenticeship]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=6269</guid>

					<description><![CDATA[&#160; Cash Converters The company said customer usernames, passwords and addresses had potentially been accessed by a third party. The data breach exposed accounts on the company&#8217;s old UK website, which was replaced in September 2017. The company told the BBC it was taking the breach &#8220;extremely seriously&#8221; and had reported it to the information [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="attachment_6271" style="width: 660px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-6271" class="wp-image-6271 size-full" title="cash converters" src="https://www.net-security-training.co.uk/wp-content/uploads/2017/11/security-breach-data-breach.jpg" alt="cash converters" width="650" height="320" /><p id="caption-attachment-6271" class="wp-caption-text">cash converters</p></div>
<p>&nbsp;</p>
<p>Cash Converters The company said customer usernames, passwords and addresses had potentially been accessed by a third party. The data breach exposed accounts on the company&#8217;s old UK website, which was replaced in September 2017. The company told the BBC it was taking the breach &#8220;extremely seriously&#8221; and had reported it to the information commissioner.</p>
<p>Cash Converters lets people trade in items such as jewelry and electronics for cash and then sells the items on to others. It operates an online store that lets people buy items traded in at Cash Converter shops around the UK. The online store was re-launched in September 2017, and the data breach affected only people with an account on the old website.</p>
<p>They said no credit card information had been breached, and people who visited its stores but did not use the website had not been affected.</p>
<p>&#8220;Our customers truly are at the heart of everything we do, and we are disappointed that they may have been affected,&#8221; the company said in a statement.</p>
<p>&#8220;We apologize for this situation and are taking immediate action to address it.&#8221;</p>
<p>&nbsp;</p>
<p>Reference: http://www.bbc.co.uk/news/technology-42010140		</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top 6 cybersecurity predictions that will shape the future of the industry.</title>
		<link>https://www.net-security-training.co.uk/top-6-cybersecurity-predictions/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Fri, 03 Nov 2017 10:38:42 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[computersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Intrusion Analyst Apprenticeship]]></category>
		<category><![CDATA[cyber intrusion analyst training uk]]></category>
		<category><![CDATA[cyber network security]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber Risk apprenticeship]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security basics]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security services]]></category>
		<category><![CDATA[cyber security technologist apprenticeship]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber technologist apprenticeship]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=5831</guid>

					<description><![CDATA[As the rate of cyber-attacks increases throughout the year, so does the amount of countermeasures created to stop and fight back, there are constantly new threats and new ways to combat them. However, one of the greatest threats in the next few years is likely to be a hack that cybersecurity professionals know today as [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>				As the rate of cyber-attacks increases throughout the year, so does the amount of countermeasures created to stop and fight back, there are constantly new threats and new ways to combat them. However, one of the greatest threats in the next few years is likely to be a hack that cybersecurity professionals know today as future attacks will stem from known vulnerabilities.</p>
<p>That is just the first prediction that comes from a long list about cybersecurity in the next two to four years made by some of the biggest names in the Cyber Security world, we’re going to share the top 5 predictions from that list with you.</p>
<div id="attachment_5836" style="width: 340px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-5836" class="wp-image-5836 size-full" title="cybersecurity " src="https://www.net-security-training.co.uk/wp-content/uploads/2017/11/Cyber-keyboard.jpg" alt="cybersecurity " width="330" height="153" /><p id="caption-attachment-5836" class="wp-caption-text">cybersecurity</p></div>
<ol>
<li>Throughout 2020, 99% of security attacks will be direct results of risks known about by cybersecurity professionals right now and have known about for at least a year.</li>
</ol>
<p>The advice given is for companies to focus on fixing these problems now, while they may be small and easy to ignore it’s cheaper to deal with them now before they become a real problem.</p>
<p>2. By 2020, a third of successful attacks will come from a company’s own shadow IT resources.</p>
<p>The way a company should deal with this is by finding a way to address shadow IT within their company and engage it with acceptance as opposed to punishment.</p>
<p>&nbsp;</p>
<p>3. By 2018, the need to protect public cloud drives will cause 20% of organisations to develop data security governance programmes. Organisations should develop company wide data security governance (DSG) by looking for gaps in their cyber security and applying counter measures where appropriate</p>
<p>&nbsp;</p>
<p>4. By 2020, 80% of new deals with cloud-based access security brokers (CASBs) will be packaged with network firewall, secure web gateway (SWG) and web application firewall (WAF) platforms.</p>
<p>&nbsp;</p>
<p>While some are worried about about customer migration to the cloud and bundling purchases, bushiness should assess the application deployment road-map and decide whether CASB investment is worth it for them.</p>
<p>&nbsp;</p>
<p>5. By 2018, companies that leverage native mobile containment rather than third-party options will rise from 20% to 60%. Experiment and familiarise your organisation with native containment solutions. Note that enterprises with average security requirements should plan to move gradually to native containment.</p>
<p>&nbsp;</p>
<p>6. By 2019, use of passwords and tokens in medium-risk use cases will drop 55%, due to the introduction of recognition technologies.</p>
<p>Passwords are too entrenched in business practices to disappear completely, but companies should seek products that focus on development of an environment of continuous trust with good user experience. Begin by identifying use cases and press vendors for biometric and analytic capabilities.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Reference for info: https://www.gartner.com/technology/home.jsp		</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
