Submission + - CrowdStrike will be just fine, thank you. (medium.com)
Data and security breaches have zero effect on the viability of a company.
Consider Target and SolarWinds. Their stocks are more than double before the data breach.
Good catch. ‘Work experience’ should be edited out.
I updated the article.
Those examples seem to be indicative of the overall problem.
Yes, they are anecdotal.
But the plural of anecdote is indeed data.
As detailed here, https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fbrothke.medium.com%2Fthe..., many of the jobs go unfilled as firms are way too cheap to pay market rates for security pros.
Very true.
If the reporters who quote those wild job statistics would take 2 minutes to think of the numbers, they’d see that it would mean that 1% of the US population would be working in information security. An utterly absurd number.
That’s why in many firms, CSO = Chief Scapegoat Officer.
The problem is that all of the ‘millions of open security jobs’ comes from the same 1 or 2 sources.
If you look a little deeper, you see that are in fact, predictions. Based on extreme scenarios.
But no one takes the time to ask them to explain their numbers. They just take it as fact and parrot the same inflated job numbers.
That’s precisely the point. See what I wrote in:
The continued fallacy of the information security skill shortage
https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fbrothke.medium.com%2Fthe...
To which I have never encountered a single company that paid market rates, that had trouble finding good information security people.
As I noted in the article, most HR generalists don’t know how to hire information security people.
Often the one thing they can use as a qualifier are certifications.
To which many people have been asked: Are you CISSP?
This is pure theatre and PR from the FCC. When it comes to stopping robocalls, the FCC and other state attorney generals have gone after the small bit players. Yes, they often are the address for scam robocallers. But if the FCC was serious about stopping scam robocalls, they would go up against the big telcos like Verizon, Sprint, AT&T, Comcast, and the other major players.
https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fbrothke.medium.com%2Fthe...
For those that want to buy used equipment on eBay, they can get it rather cheap.
For those that don’t need cutting edge hardware, there is a lot available at near giveaway prices.
The book is replete with these scenarios, and each scenario includes downloadable figures that effectively illustrate the mechanisms used to solve the problem.
Chapter 3 provides a number of first-rate architectural ideas on how to design a highly resilient cloud solution. Much of the promise of the cloud is built on scalability, elasticity and overall optimization. These chapters show how to take those possibilities from conceptual to a working implementation.
Cloud failures are inevitable and chapter 4 details how to build failover, redundancy and recovery of IT resources for the cloud environment.
Chapter 9 is particularly important, as far too many designers think that since the underlying cloud abstraction layer is highly secure, everything they build on top of that will have the same level of security. The book details a number of design patterns that are crucial to ensuring the cloud design is securing that data at rest and is resistant against specific cloud attacks.
With a list price of $49.99, the book is a bargain considering the amount of useful information the book provides. For anyone involved with cloud computing design and architecture, Cloud Computing Design Patterns, is an absolute must read.
Reviewed by Ben Rothke
Parts that positively cannot be assembled in improper order will be.