-
Is the Information Security Gender Gap Closing?
almost 3 years agoIt’s no secret that globally, the cybersecurity industry is male dominated. Studies from recent years have highlighted the gender imbalance across the cybersecurity space. For example, a 2018 report revealed that “women accounted for 10% of the cybersecurity workforce in the Asia-Pacific region, 9% in Africa, 8% in Latin America, 7% in Europe and 5% in the Middle East....
-
Hiring for Series A, B and C Start-Ups in Cybersecurity
almost 3 years agoWith almost nine years of experience hiring for enterprises, our Head of Technical Cybersecurity across North America Luke Zbieranowski has worked alongside a range of organisations to hire high-end cybersecurity talent. He now exclusively works with Series B and Series C, high growth, and high demand start-ups in cybersecurity.We spoke to him about his role and how hir...
-
Managing COVID-19 Cyber Security Threats
about 3 years agoThe arrival of COVID-19 shocked the cyber landscape, providing a golden age of opportunity for cyber attackers. Over the past year, there has been a demonstrated increase in COVID-related cyber threats and high-profile data breaches. This surge in cyber threats and web of disruptions that COVID-19 has brought to the cyber landscape has meant that over the past year, dem...
-
The Effect of COVID-19 on Cybersecurity Talent Acquisition: A CyberStream Case Study
about 3 years agoCOVID-19 has transformed every aspect of our lives, from our everyday working practices to how we communicate with friends, family, and colleagues. Work has been brought home, home has been brought to work, and businesses across the globe have been forced to reassess their expansion plans due to ongoing uncertainty about what is happening next.The same cannot be said for...
-
Cybersecurity Consulting During COVID-19
about 3 years agoA Chat with Senior Advisor & Analyst at KuppingerCole, Phillip Messerschmidt The arrival of the pandemic transformed the cyber-threat landscape, resulting in an explosion of COVID-related attacks. When the National Cyber Security Centre released its annual review at the end of 2020, it was reported that over a quarter of cybersecurity incidents were COVID-19 related. ...
-
What is Information Security and Assurance?
about 3 years agoInformation Security and Assurance jobs are challenging, rewarding, and constantly evolving. Information systems are at the centre of every organization’s infrastructure, so protecting the information and data that comprises that is critical. This foundational need means that there is an ever-growing demand for certified information assurance and security specialists in...
-
Goldilocks and the three Millennial Hackers
over 4 years agoI, like those of you reading this who grew up in the 90’s, being born into the digital age was, and is, an absolutely wild time to be alive.For the generations before us looking in, seeing the birth of the Cellphone, LED TV’s… The Internet is completely world changing. But for us, the ‘Millennials’, the timing was of Goldilocks level – Just right. Allowing us to ride the tec...
-
Your phone knows you better than your partner
over 4 years agoWHERE YOU ARE, WHAT YOU BUY, HOW MUCH YOU SPENDEverything from your current location, the number of steps you’ve walked, the complete record of your text and photo messages, and even your bank account details. Are you sure your friends, family and your lover know at least half of what your phone knows about you?All the applications and the internet sites you’re accessing da...
-
Does culture influence recruitment?
over 4 years agoI mean humanity has warred over which culture is better than the other since Adam ate an apple.We see the competition every day on social media about what looks better, what building is more beautiful than the other, what society is better well equipped than the rest. Social Media can often both be a very dishonest depiction of people but a very true reflection of culture.“...
-
Writing the Perfect CV
almost 5 years agoFor my very first TechStream/EarthStream blog I decided to take it back to basics and delve into the “etiquette” of CV writing and formatting.Recruiters and Hiring Managers look at between 50 and 300 CV’s for any given position and as much as your experience, your employers and your qualifications are important, your CV formatting and the content in your CV is just as influ...
-
Common Mistakes in Cyber Security Hiring
almost 5 years agoHey, we all make mistakes, right? We are all human after all…Unless your name is Sophia (the first humanoid) and you struggle to gain eye contact.If you are running a tight ship and need that ideal professional to add value to your already amazing team you have been shaping over several months, there are a few key things to remember when going through the Hiring process.Hop...
-
Cyber Security Gender Disparity
about 5 years agoOur Head of Cybersecurity Consultancy Practice, North America (Principal Consultant), Luke Zbieranowski, offers his insights into the cyber security industry.Part 1For those of us who interact with the cybersecurity market on a daily basis, it’s starting to feel like we’ve hit a crossroads. Several disconcerting strands have come to a head, making the path ahead uncertain.O...
-
The Humans of ICS Cybersecurity, the key to protecting US critical infrastructure
almost 6 years agoA nuclear reactor remotely blown up, killing millions. A country wide blackout that lasts for weeks, leading to civil unrest and anarchy.An attack on our very water supply, preventing millions accessing clean water.These all sound like plot lines to the next Hollywood blockbuster, but these are not plot lines, they are very real concerns, theorized by very real and knowledg...