c
July 1, 2022, 12:27 a.m. |

Cloud Security Alliance cloudsecurityalliance.org

This blog was originally published by CXO REvolutionaries here. Written by Heng Mok, CISO APJ, Zscaler. The weakest link in a security architecture is often the people it protects. Although cloud-driven attacks like ransomware-as-a-service (RaaS) dominate headlines, social engineering remains a proven and effective way to gain a foothold on a network.New research from ThreatLabZ, Zscaler’s embedded threat research team, drives home the importance of defending against phishing attacks as one o...

cisos phishing

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Audit and Compliance Technical Analyst

@ Accenture Federal Services | Washington, DC

ICS Cyber Threat Intelligence Analyst

@ STEMBoard | Arlington, Virginia, United States

Cyber Operations Analyst

@ Peraton | Arlington, VA, United States

Cybersecurity – Information System Security Officer (ISSO)

@ Boeing | USA - Annapolis Junction, MD

Network Security Engineer I - Weekday Afternoons

@ Deepwatch | Remote