<img height="1" width="1" src="https://www.facebook.com/tr?id=205228923362421&amp;ev=PageView &amp;noscript=1">
  • 844-558-4782

CyberVista Blog

Why Your Best Cyber Talent is Going to Leave You

Why Your Best Cyber Talent is Going to Leave You According to a 2017 survey by ISSA and ESG, nearly half (49%) of cybersecurity practitioners are solicited for a job opportunity at least once a week. Stretching that out to a monthly range, almost every cybersecurity employee is presented with at least one [...]
Read More

Aug 16, 2018

0

Questions That Need Answers: How to Pronounce CISO

QTNA: How to Pronounce CISO In CyberVista's Questions That Need Answers (QTNA) video series, we tackle some of the most testable and important cybersecurity questions on a weekly basis. This week we're following up from our time at Black Hat 2018 where we asked folks a much debated question in cybersecurity. Here [...]
Read More

Aug 15, 2018

0

California's Consumer Privacy Act

California’s Consumer Privacy Act The California State Legislature has passed A.B. 375 otherwise known as the California Consumer Privacy Act (CCPA) which grants consumers sweeping protections for consumers’ personal online data. The Act, set to go into effect on January 1, 2020, will grant all California [...]
Read More

Aug 14, 2018

0

A Tale of Two Crowns: Prioritizing Important Assets

A Tale of Two Crowns: Prioritizing and Protecting Your Most Important Assets    It was a scene that could have come straight out of a heist movie. Last Tuesday, August 2, two burglars broke into a cathedral near Stockholm and stole several of Sweden's famous crown jewels. The thieves smashed a security case, [...]
Read More

Aug 7, 2018

0

The Cyber Talent Right Under Our Noses

The Cyber Talent Right Under Our Noses While cyber roles vary wildly, surveys rank soft skills like critical thinking and written and verbal communications among the top most requested by employers. Yet, many employers aren’t finding qualified applicants that meet the steep list of technical skills required like [...]
Read More

Aug 2, 2018

1

Preventing the Next Digital Black Swan

Preventing the Next Digital Black Swan: The Auditor, The CISO and The C-Suite Their brand names are notorious in cybersecurity circles: Equifax, Uber, Maersk, and Saudi Aramco. Each of these businesses suffered a big breach – cyber incidents that affected many millions of customers. But it wasn’t only consumer [...]
Read More

Jul 31, 2018

0

The Hypocrisy of Cyber's Hippocratic Oath

The Hypocrisy of Cyber’s Hippocratic Oath When graduating medical school, physicians take the medical Hippocratic Oath known as Primum Non Nocere – “First Do No Harm.”  There’s a lot more to the Hippocratic Oath, and as I share my own experience in medical training, I will draw parallels to how similar and [...]
Read More

Jul 26, 2018

0

Top 3 Challenges for CISOs

The Top 3 Challenges for CISOs Ever since the position emerged more than a decade ago, the CISO role has been a difficult one. CISOs are responsible for an objective that they can never guarantee with 100 percent certainty: securing the organization. CISOs don’t receive kudos when a week goes by without a cyber [...]
Read More

Jul 24, 2018

0

Student Spotlight: Kathleen Rooney

Student Spotlight: Kathleen Rooney Welcome back to CyberVista’s Student Spotlight Series. In this series we talk with InfoSec professionals who used the CyberVista system. This episode we talked with Community and Communications Lead, Kathleen Rooney, of QTNA fame. The following interview has been edited for [...]
Read More

Jul 19, 2018

0

Questions That Need Answers: IDS Functionality

QTNA: IDS FUNCTIONALITY In CyberVista's Questions That Need Answers (QTNA) video series, we tackle some of the most testable and important cybersecurity questions on a weekly basis. This week we're covering a question related to IDS functionality. Here we go...
Read More

Jul 18, 2018

0