Ketty C.cyberjournal.io·Aug 29, 2024Career Options in Cyber SecurityHowdy🖖 I have been quiet for a while because I have been busy job hunting for the past few months and exploring different areas in cybersecurity. I wanted to compile this information and share some of my research with those who have also recently en...Discusscyber security
alice eneyoaliyo.hashnode.dev·Aug 28, 2024Day 8: Fundamental terms and definitions that underpin the cybersecurity realm. 📚On Day 8 of the "Foundations of Cybersecurity" course on Coursera, l delved into crucial terms and definitions in cybersecurity. 📚 Here's a summary of the key concepts l covered: - Hacktivist: A hacker who supports political or social causes. - NIST...Discuss#cybersecurity
Tanishka Marrottcloud-design-diaries.hashnode.dev·Aug 26, 2024Governance, Risk and Compliance (Get to the Crux. No Fluff.)A lot of people treat security as if it's a separate entity altogether —That's where they miss the mark... The Security Strategy ∝ The Corporate Strategy Let's get to the crux - real-quick. 💡 — Q: What's governance? Overseeing -> Directing...Discuss·1 likeCloud
alice eneyoaliyo.hashnode.dev·Aug 20, 2024🔒 Elevating Cybersecurity and Tech Skills: A Journey of Growth 🔒I’m thrilled to share that I’m diving deeper into the world of cybersecurity and tech skills! 🌐🔐 As we all know, the tech landscape is constantly evolving, and staying ahead requires continuous learning and adaptation. I’m currently focusing on enh...Discuss#cybersecurity
Preeti Samuelpreetisamuel.hashnode.dev·Mar 2, 2024What is GRC?Introduction GRC is a business framework that combines governance, risk management, and compliance activities, ensuring legal and ethical operations and effective risk management through the coordination of policies, processes, and technology Organiz...Discussgrc
Neviar Rawlinsonneviarrawlinson.hashnode.dev·Dec 24, 20233-Month Roadmap to Launch Your Cybersecurity Career with No Prior ExperienceEmbarking on a cybersecurity career without prior experience might seem like a daunting task, but with dedication and a well-structured roadmap, you can make significant strides in just three months. This article outlines a step-by-step plan to help ...Discuss·10 likes·46 reads#cybersecurity
CyberFreak999cyberfreak.hashnode.dev·Sep 18, 2023Governance, Risk and Compliance: The non-technical side of CybersecurityCybersecurity is often dominated by sophisticated hacks, advanced technology, and complex coding. A fundamental aspect, however, operates largely in the shadows -- Governance, Risk, and Compliance (GRC). Governance, Risk, and Compliance (GRC) is a wa...Discuss·59 readsCybersecuritycybersecurity
Jennifer Mbaegbujencloud.ca·Jun 12, 2023Building Cyber-Resilience: 6 Approaches with NIST CSFThe NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) is a widely recognized and adopted framework that provides a structured approach to managing cybersecurity risks. From studying the NIST CSF, I observed that most o...Discuss·57 readsNIST