Defradar Technology Blog

The greatest Privacy, Cyber and Career Development Topics

Defending The Internet With A Cybersecurity Degree Online

Getting a cybersecurity degree online is a brave step in learning what it takes to protect a virtual society. The miracle of being connected to anyone at anytime in any location is now a way of life. There is a dependence on the cyber network for everything from keeping in touch to paying bills....

READ MORE

Data Protection Strategy - An easy guide to RAID recovery (CIPT)

I usually get a lot of technical questions in my trainings related to strategies or tools that can be implemented to protect data. One of the easiest ways to implement fault tolerance at storage level, and part of any enterprise backup strategies is RAID. But RAID systems are not "cool" and...

READ MORE

​The Importance of Personal Career Development for Students

For several decades, high schools across the United States have instituted a Career Day for seniors. This is a day when local area business professionals visit the high school and introduce career options to high school students. However, these Career Days are not enough to truly assist the high...

READ MORE

The "Luck" role in your career

"I was the best in my generation at football, but my father didn't support me." "I could easily become one of the best in my country, but the coach can't stand me." "Today I would have been in the national team, but I gave up when I came across a coach who asked us for money to join the...

READ MORE

How to Break Into A Career In Cybersecurity As A Woman

It’s no secret that tech and STEM jobs tend to be dominated by men. From a young age, women have it ingrained in their heads that these jobs tend to be “masculine,” and are encouraged to stay away from jobs in the STEM field. This is reflected in the small number of women currently serving in...

READ MORE

Cyber/Privacy Jobs: How to make your interview competitors irrelevant in 2020!

I am often asked what is the better way to prepare for an interview and how to actually increase your chances to get the job. Well, yes, my experience is focused on cybersecurity and privacy roles, both as a recruiter, building several security and privacy teams in my career, and also as a...

READ MORE

GDPR Regulators - what are they looking for in their audits?

We have always received this question from our clients. What GDPR regulators will do and what they will be looking for? Well, we know this may be a totally complex discussion, but we would like to give a short overview and few hints about their role as GDPR regulator. The regulators will be...

READ MORE

Can Watson save the Security World?

So, will Watson save the world? I should stress again that Watson, in its current incarnation, is intended to augment, not replace, the work of human analysts. To claim that any system could save the world suggests that a critical, irreplaceable resource is protected at least enough for the world...

READ MORE

Security starts with People

by SecurityIntelligence.com The Gartner IAM Summit in London is one of the most interesting security conferences of the year. The annual event draws IT, cybersecurity and business professionals, and it offers resources any organization can use to keep its end users secure and compliant while...

READ MORE

IT Resilience? what about it?

by SecurityIntelligence.com IT resilience refers to a network or system’s ability to withstand the slings and arrows of life and operations, from human error to migration failure to natural disaster. Any of these unavoidable factors can disrupt or even cripple an enterprise. As a concept, IT...

READ MORE