Talent Development Centre

Tag Archives: cybersecurity

Predicting Key Trends in Cybersecurity

Predicting Key Trends in Cybersecurity

There is no shortage of tech trends to discuss. Regardless of your role or industry, changes are coming at a fast-pace, and keeping up with them is imperative to your career success. Knowing what’s on the horizon and predicting what clients will want, lets you keep the right skills and certifications up to date, as well as highlight the right sections of your resume to truly sell yourself.

One area seeing excessive growth world-wide, and across every industry, is Cybersecurity. It isn’t a secret nor should it come as a surprise to anyone that, although this area has always been growing, the COVID-19 pandemic propelled that growth. Thycotic’s 2020 Global Survey or Cyber Security Leaders, which checked-in with 900 senior IT decision-makers in large companies around the world, backed up this observation, saying it’s due to so many organizations adding technology and moving to cloud solutions. (Interestingly, that same survey showed that an overwhelming number of these companies don’t fully-utilize the security technology they implement, but that’s a topic for another day.)

Gartner is also observing security trends, which they recently highlighted in their Top Strategic Technology Trends for 2021. First, they note that privacy-enhancing computation is going to play a big role for IT departments in the coming years. Noting the maturation of global data protection legislation as a main driver, they predict that by 2025, half of large organizations will implement privacy enhancing computation for processing data in trusted environments. Gartner also says that the Cybersecurity Mesh, the idea that anyone can access a digital asset securely, regardless of the location of the person or the data, is going to continue growing. They state that by 2025, half of all requests will be supported by the Cyber Security Mesh.

So, what are the best skills to build up in the coming year to ensure you can take advantage of these trends? This past October, Burning Glass released a report highlighting the fastest-growing Cybersecurity skills, and it’s packed with information for the IT Security professional or tech enthusiast looking to break into the field. They analyzed over a billion historical job records and projected 5-year growth rates for specific jobs. Overall, it shows a trend towards building secure digital infrastructure from the ground up.

The report highlights the top 10 growing skills, which are listed below, showing that Application Development Security and Cloud Security are the place to be. The top one, which includes sub-skills such as DevSecOps, Container Security, Microservices Security, and Application Security Code Review, is expected to see 164% growth over the next 5-years!

  1. Application Development Security (164% growth)
  2. Cloud Security (115% growth)
  3. Risk Management (41% growth)
  4. Threat Intelligence (37% growth)
  5. Incident Response (36% growth)
  6. Compliance and Controls (36% growth)
  7. Data Privacy and Security (32% growth)
  8. Access Management (164% growth)
  9. Security Strategy and Governance (20% growth)
  10. Health Information Security (20% growth)

Technology is connecting our world in incredible ways, but that means more and more sensitive data is flowing and protecting it is key in keeping products trusted and successful. What other Cybersecurity trends are you seeing, or expecting to see, in the coming year?

Attracting More Female Leaders into Cybersecurity

Cybersecurity is a growing field with an increasing demand for professionals in the field. In fact, in 2017, Cybersecurity Ventures predicted that there will 3.5 million cybersecurity job openings by 2021. Yet still, with such great need and opportunity, a study in the same year found that women only make up 11% of the total cybersecurity workforce.

It is clear that the entire IT industry needs more women, and cybersecurity especially is proving to have an even larger gap. What is stopping this demographic from entering the field? How did those already successful in it get there and what kind of advice do they give? This infographic by Varonis has the answers and more interesting statistics on the topic.

Attracting More Female Leaders into Cybersecurity

Jaw-Dropping Data Breach Stats for 2019

Data breaches are detrimental to a company. Setting aside the reputation damage that comes with them, the harm done to customers plus the impending legal battles that follow have cost millions and sometimes billions of dollars for organizations that were presumed to be secure. In today’s world where hacking is a sport with a lucrative pay-out, cybersecurity experts are in high demand.

Varonis recently sourced a list of 56 data breach statistics, including risks, costs and prevention tips. Along with the list came this infographic that highlights the most interesting and helpful stats. Have a look for some eye-opening facts that will make you think twice the next time you’re entering personal information into a field.

How Does Blockchain Work? (“simply” explained)

It’s nearly impossible to scroll through tech blogs or business articles these days without reading about some form of cryptocurrency or other technology secured by a Blockchain. Last week, we shared a video showing how hackers crack passwords and explaining some basic hash techniques that help protect passwords. That technology is child’s play compared to Blockchain technology.

Most of us can accept that Blockchains are one of the best ways to secure information today, but understanding how they work and what they do is a whole other story. If you do understand, then how are you at explaining it. Regardless, this video from Simply Explained is touted as the best video on YouTube for explaining how a Blockchain works.

How Does Password Encryption Work?

If you’re an IT security expert, or any technology professional for that matter, you already have a decent idea of how passwords are saved. You’re well aware that they do not get saved in plain text form and that encryptions (try to) protect passwords from being hacked. You also probably know their vulnerabilities. Have you ever tried explaining all of that to a non-technical friend who still insists on using 123456 as their go-to password?

This video from Tech Raj puts everything on the table. It clarifies the technology of passwords and gives examples of how hackers typically get through them, including rainbow tables, dictionary attacks, and brute force attacks. If you’ve been wanting to explain the basics behind password hacking but are having trouble getting into words, then feel free to share this video.

Protect Yourself Online with These Tips from a Former Hacker

Monday’s infographic explaining the elements of a data security policy is helpful for organizations and those advising companies on best practices for their data. But individuals also need to think about cybersecurity and protect themselves from hackers. And what better way to defend against a hacker than to learn from one?

In this video from Tech Insider, a former NSA hacker explains some of his past tricks and shares some tips to protect yourself online. Some of these may be common sense, but in other situations, you may be creeped out by what these technology geniuses can accomplish.

9 Key Elements of a Data Security Policy

There’s nothing more invigorating than policy, right?! It’s not always an exciting subject but if you’re an IT Security professional, then you know the right data security policy is crucial to maintain an organization’s integrity. If you’re not in the IT security field but responsible for your organization’s data, then it may be an overwhelming topic.

Insurance companies hold a lot of personal data and a single breach can be detrimental for their reputation and, more importantly, their clients. So, when insurance company Travelers put together this infographic explaining their key elements of a data security policy, we thought it worthy to share, especially for those unfamiliar with the topic. Is there anything you would add or remove?data security policy infographic

Quick Poll Results: Do IT Professionals Follow IT Security Best-Practices

It should be a fair assumption that the more knowledge we have about threats, the more cautious we will be. For example, a hiker who is educated about dangerous animals, poisonous plants and harmful bugs is going to proceed down a nature trail much more carefully than the casual jogger who knows little about the forest. By that same thinking, an IT professional who understands security threats should be more cautious when navigating the Internet, right?

Last month’s contractor quick poll set-out to prove that theory. We asked IT contractors which password mistakes they made recently. As expected, everybody takes the odd shortcut, but surprisingly, 80% of respondents said they use the same password in multiple places and don’t change their passwords frequently. Are you shocked with these results or are they what you would expect?

Quick Poll Results: What password mistakes have you made recently?

Contractor Quick Poll: Do You Make These Password Mistakes?

It never ends! It seems every time we turn on the news we hear about an organization who had their data hacked in one way or another. On a personal level, how many times have you received notes from people on Facebook or through email warning you not to click their links because they were hacked?

There are a number of ways your account may be hacked, but experts frequently tell us that the easiest way to avoid a hack is to follow best practices when setting passwords and avoid falling into slumps. In this month’s Contractor Quick Poll, we’re asking our audience — knowledgeable IT professionals — how many password mistakes they make.

How Hackers Get Around Two-Factor Authentication

Two factor authentication is an extra security measure a lot of people have begun to use to further protect their accounts and personal information from being hacked. This authentication method sends a text to your phone with a code that must be inputted within a minute to log in.

However according to Tech Insider’s interview with Kevin Mitnick, hackers have ways to even bypass this. An example he uses is when Black Lives Matter activist DeRay McKesson had his twitter hacked. While there’s no need for constant paranoia, this video suggests tips to stay aware of the common tricks hackers use.