CV hints and tips when looking for a job in cyber security.

CV hints and tips when looking for a job in cyber security.
What a year 2020 has been. As we look ahead to 2021, we have been discussing our thoughts on what might lie ahead for the cyber security world. Ransomware & Insider Threats Ransomware will continue to be a significant threat throughout 2021. We will see increased targeting of larger organisations. As well as more creativity […]
At JUMPSEC we’ve managed to get our hands on tickets to what is probably the greatest cyber security event in the calendar, HackFu!In order to be in with a chance of winning you simply need to complete the following challenge which you can download here (the download contains all the information needed to complete the […]
Zero Trust is simply a concept, a model which states that you really should not be trusting anyone or any device just because they reside on your network or within your perimeter. All networks should be considered untrusted and hostile, regardless of whether we are talking about a local network in a secure building or […]
JUMPSEC are delighted to welcome John Fitzpatrick and Andy Roberts who have joined the JUMPSEC management team this week. They both bring with them a wealth of experience from the cyber security industry and this is an exciting time for the business. John has joined as Chief Technical Officer and will be responsible for JUMPSEC’s […]
JUMPSEC, LONDON, 7 July 2020 | Press Release Congratulations to Isabelle Bearn, one of our Client Service Directors who has recently passed her Certified Information Security Manger (CISM) exam. Certified Information Security Manager [CISM] is a certification for professionals involved in IT security management and governance. It is the most sought-after IT credential. The certification […]
Thom explains the difference between a Vulnerability Assessment & a Penetration Test JUMPSEC cyber security expert Thom sheds some light on Vulnerability Assessments, Penetrations Tests and the differences between them. “Vulnerability assessments typically rely on vulnerability scanning tools to identify technical vulnerabilities making use of pre-configured test cases and signatures. A penetration test takes a […]
Courtney explains the difference between External & Internal Managed Vulnerability Scanning “External Managed Vulnerability Scanning only targets infrastructure on the public internet perimeter, such as web applications and VPN services. by contract Internal Managed Vulnerability Scanning focuses only on your internal infrastructure, such as a user workstations, files servers and so on. External and Internal […]
This week we take a look at our most popular Jargon Buster’s from the last 6 months “What is Denial of Service came in at the top spot” and “What is Distributed Denial of Service at number 3. So, we have combined the two together, just in case anyone missed either of them. Check out […]
Ray explains the term C&C or Command & Control Server Following on from last weeks discussion about Botnets Ray Welland talks about the C&C or Command & Control server “A C&C is an application or server that controls all the bots in the botnet. The hacker will then send a command through the server which […]