Open in app

Sign In

Write

Sign In

Jerry Williams
Jerry Williams

10 Followers

Home

About

Mar 24, 2022

Becoming an Ethical Hacker in 2022

Today! Ethical hacking is one of the most reputed domains in the cybersecurity realm. The jobs for ethical hackers skyrocket with the increasing day-to-day cyberattacks. These hacking professionals can fit into many crucial job roles whether it's a cybersecurity analyst, IT manager, CIO, Information Security Manager, and so on. For…

Certified Ethical Hacker

3 min read

Becoming an Ethical Hacker in 2022
Becoming an Ethical Hacker in 2022
Certified Ethical Hacker

3 min read


Oct 6, 2020

Interview with Amruta Gawde, Practices Program Manager — Identity Access Management, Simeio Solutions

From dispersing office spaces to remote working, COVID-19 forced organizations to have a holistic approach to cybersecurity. Business continuity transformed overnight to navigate through the pandemic. The industry also experienced a paradigm shift in embracing human error, addressing cyber threats, and securing data. In a digitally enabled economy, Identity and…

Latest Cyber Threats

7 min read

Interview with Amruta Gawde, Practices Program Manager — Identity Access Management, Simeio…
Interview with Amruta Gawde, Practices Program Manager — Identity Access Management, Simeio…
Latest Cyber Threats

7 min read


Oct 5, 2020

CYBER WARFARE: The Fight Beyond Enemy Lines [Infographic]

Digitization has helped businesses immensely, especially, in the ongoing pandemic. It has allowed robustness through business continuity, remote working capability, and online supply chain management. However, this has given birth to a new threat landscape that stretches from our critical assets to as close as our homes, which we once…

Cybersecurity

2 min read

CYBER WARFARE: The Fight Beyond Enemy Lines [Infographic]
CYBER WARFARE: The Fight Beyond Enemy Lines [Infographic]
Cybersecurity

2 min read


Oct 4, 2020

The Biggest Cybersecurity Threats for Financial Services

With so much banking being done online, financial service providers are no stranger to cyberthreats. However, the recent COVID-19 pandemic is being blamed for a 238% increase in cyberattacks against banks and other financial institutions, according to the latest cybersecurity statistics. …

Cyber Threat

5 min read

The Biggest Cybersecurity Threats for Financial Services
The Biggest Cybersecurity Threats for Financial Services
Cyber Threat

5 min read


Sep 25, 2020

Episode #2: Digitization and Cybersecurity in Fourth Industrial Revolution

Security in the Manufacturing domain has always been a concern. When product information, designs, blueprints, and research/test information is digitalized, the security of this data becomes vital to protecting the intellectual property of an organization. As we embark on the fourth industrial revolution, we see the fusion of OT (operational…

Podcast

5 min read

Episode #2: Digitization and Cybersecurity in Fourth Industrial Revolution
Episode #2: Digitization and Cybersecurity in Fourth Industrial Revolution
Podcast

5 min read


Sep 16, 2020

Red Teaming: A Continuous Assessment of Security of Information Systems

When it comes to cybersecurity, no organization can be 100 percent safe. Even organizations that use advanced security technologies may face problems with such key elements as people, business processes, technologies, and associated intersection points. There are many methods that help to evaluate the protection level: analysis of the security…

Red Team

7 min read

Red Teaming: A Continuous Assessment of Security of Information Systems
Red Teaming: A Continuous Assessment of Security of Information Systems
Red Team

7 min read


Sep 15, 2020

Interview with Laurence Pitt, Global Security Strategy Director at Juniper Networks

Enterprise security challenges witnessed a sudden uptick due to the spike in work from home. A recent study commissioned by Juniper and conducted by Vanson Bourne explored the attitudes, perspectives, and concerns of senior IT networking and security professionals from various industry sectors across the globe. …

Security

7 min read

Interview with Laurence Pitt, Global Security Strategy Director at Juniper Networks
Interview with Laurence Pitt, Global Security Strategy Director at Juniper Networks
Security

7 min read


Sep 14, 2020

Here are 5 Practical Steps for Organizations to Implement a Zero-Trust Network Policy

While the concept of Zero Trust was created 10 years ago, the events of 2020 have thrust it to the top of enterprise security agendas. The COVID-19 pandemic has driven mass remote working, which means that organizations’ traditional perimeter-based security models have been broken up, in many cases literally overnight…

Zero Trust

7 min read

Here are 5 Practical Steps for Organizations to Implement a Zero-Trust Network Policy
Here are 5 Practical Steps for Organizations to Implement a Zero-Trust Network Policy
Zero Trust

7 min read


Sep 11, 2020

Podcast: How Digital Risk Management (DRM) is Changing During the Pandemic

When the pandemic came along earlier this year, more businesses increased their reliance on digital infrastructure. Today, businesses rely heavily on digital processes to run their operations. Clearly, the risk has shifted to digital platforms and DRM is the next evolution in enterprise risk and security for organizations. The ultimate…

Podcast

2 min read

Podcast: How Digital Risk Management (DRM) is Changing During the Pandemic
Podcast: How Digital Risk Management (DRM) is Changing During the Pandemic
Podcast

2 min read


Sep 9, 2020

CISO MAG’s Exclusive Interview with Yotam Gutman, Marketing Director at SentinelOne

It’s not every day that one gets to meet an influential person from the world of cybersecurity. CISO MAG caught up with Yotam Gutman, Marketing Director at SentinelOne. He once served as Lt. Commander in the Israel Navy. …

Sentinel

6 min read

CISO MAG’s Exclusive Interview with Yotam Gutman, Marketing Director at SentinelOne
CISO MAG’s Exclusive Interview with Yotam Gutman, Marketing Director at SentinelOne
Sentinel

6 min read

Jerry Williams

Jerry Williams

10 Followers

Tech Evangelist, Cyber Security Analyst and Enthusiast

Following
  • Prof Bill Buchanan OBE

    Prof Bill Buchanan OBE

  • Colin Horgan

    Colin Horgan

  • Rajashakher Intha

    Rajashakher Intha

  • Daniel Colin James

    Daniel Colin James

  • Michael Dell

    Michael Dell

See all (10)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech