Categories
Uncategorized

CTO View of Hiring Cyber Security Specialists

CV hints and tips when looking for a job in cyber security.

Categories
Cyber Security Jumpsec Security Uncategorized

2021 Cyber Security Predictions

What a year 2020 has been. As we look ahead to 2021, we have been discussing our thoughts on what might lie ahead for the cyber security world.  Ransomware & Insider Threats Ransomware will continue to be a significant threat throughout 2021. We will see increased targeting of larger organisations.  As well as more creativity […]

Categories
Uncategorized

Win a place @HackFu 2021 Community Edition!

At JUMPSEC we’ve managed to get our hands on tickets to what is probably the greatest cyber security event in the calendar, HackFu!In order to be in with a chance of winning you simply need to complete the following challenge which you can download here (the download contains all the information needed to complete the […]

Categories
Cyber Security Jumpsec Security Uncategorized

What is Zero Trust?

Zero Trust is simply a concept, a model which states that you really should not be trusting anyone or any device just because they reside on your network or within your perimeter. All networks should be considered untrusted and hostile, regardless of whether we are talking about a local network in a secure building or […]

Categories
Uncategorized

NEW MANAGEMENT TEAM MEMBERS ON BOARD AT JUMPSEC

JUMPSEC are delighted to welcome John Fitzpatrick and Andy Roberts who have joined the JUMPSEC management team this week. They both bring with them a wealth of experience from the cyber security industry and this is an exciting time for the business. John has joined as Chief Technical Officer and will be responsible for JUMPSEC’s […]

Categories
Uncategorized

Examination success Certified Information Security Manager (CISM)

JUMPSEC, LONDON, 7 July 2020 | Press Release Congratulations to Isabelle Bearn, one of our Client Service Directors who has recently passed her Certified Information Security Manger (CISM) exam. Certified Information Security Manager [CISM] is a certification for professionals involved in IT security management and governance. It is the most sought-after IT credential. The certification […]

Categories
Jargon Buster Uncategorized

Jargon Buster Vulnerability Assessments vs Penetration Tests

Thom explains the difference between a Vulnerability Assessment & a Penetration Test JUMPSEC cyber security expert Thom sheds some light on Vulnerability Assessments, Penetrations Tests and the differences between them. “Vulnerability assessments typically rely on vulnerability scanning tools to identify technical vulnerabilities making use of pre-configured test cases and signatures. A penetration test takes a […]

Categories
Jargon Buster Uncategorized

Jargon Buster External & Internal Managed Vulnerability Scanning

Courtney explains the difference between External & Internal Managed Vulnerability Scanning “External Managed Vulnerability Scanning only targets infrastructure on the public internet perimeter, such as web applications and VPN services. by contract Internal Managed Vulnerability Scanning focuses only on your internal infrastructure, such as a user workstations, files servers and so on. External and Internal […]

Categories
Jargon Buster Uncategorized

Jargon Buster Revisted – Denial of Service and Distributed Denial of Service

This week we take a look at our most popular Jargon Buster’s from the last 6 months “What is Denial of Service came in at the top spot” and “What is Distributed Denial of Service at number 3. So, we have combined the two together, just in case anyone missed either of them. Check out […]

Categories
Uncategorized

Jargon Buster Command & Control Server

Ray explains the term C&C or Command & Control Server Following on from last weeks discussion about Botnets Ray Welland talks about the C&C or Command & Control server “A C&C is an application or server that controls all the bots in the botnet. The hacker will then send a command through the server which […]