Bug Bounty Hunters: From Side Hustle to Tech Career Dice Staff, May 12, 2022 10 min read The number of bug bounty programs offered by enterprises and government agencies continues to expand—presenting more...
Information Security Analyst: A Hot Career Track on the Upswing Dice Staff, May 5, 2022 9 min read With cyberattacks proliferating, it's not surprising that organizations of all sizes are spending more on...
Cloud Security Specialist: Skills That Can Boost Your Job Prospects Dice Staff, April 21, 2022 10 min read Despite optimism (at least in the U.S.) that the worst of the COVID-19 pandemic is over, remote and hybrid work is...
Threat Hunting Skills Can Boost Your Cybersecurity Career Dice Staff, April 12, 2022 9 min read Every year, cybercrime continues to increase. Consider the annual Internet Crime Report released by the...
Pen Testing: Which Skills Can Help Cybersecurity Job Seekers? Dice Staff, April 5, 2022 9 min read Security concerns are everywhere these days. From Russia’s war with Ukraine to ransomware attacks...
Why Cryptocurrency Regulations Will Drive Need for Tech Skills Dice Staff, March 23, 2022 10 min read Introduced in 2009, Bitcoin (and the other cryptocurrencies that appeared in its wake) offered the prospect of a true...
Dice Equality in Tech Report: Companies Focus on Gender Equality Dice Staff, March 21, 2022 1 min read Prevalent gender discrimination, from a lack of promotional opportunities to the everyday perception that...
SIM-Swapping Attacks Threaten Enterprises as Much as Consumers Dice Staff, March 9, 2022 7 min read For years, security analysts and researchers warned about fraudsters’ increasing use of SIM-swapping techniques to...
Ukraine Invasion Means Cybersecurity Focus for Technologists Dice Staff, March 2, 2022 10 min read While the Russian invasion of Ukraine is a little over a week old, most of the initial news involves...
Insider Threats: Why These Cybersecurity Incidents Continue to Grow Dice Staff, February 21, 2022 10 min read With the rising threat of ransomware and other attacks that originate from outside organizations’ networks, it’s...