<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[CarlsCloud™]]></title><description><![CDATA[AI Trends & Cloud Security - CISSP & CCSP Resources]]></description><link>https://carlscloud.com/</link><image><url>https://carlscloud.com/favicon.png</url><title>CarlsCloud™</title><link>https://carlscloud.com/</link></image><generator>Ghost 5.45</generator><lastBuildDate>Fri, 24 Apr 2026 09:00:44 GMT</lastBuildDate><atom:link href="https://carlscloud.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[April 2026 Patch Tuesday: Massive Fixes for Microsoft, Chrome, and Adobe]]></title><description><![CDATA[Microsoft has just rolled out software updates to fix a staggering 167 security vulnerabilities across its Windows operating systems and related software. ]]></description><link>https://carlscloud.com/april-2026-patch-tuesday-massive-fixes-for-microsoft-chrome-and-adobe/</link><guid isPermaLink="false">69dfef219ece12000144e661</guid><category><![CDATA[microsoft-april-2026-patch-tuesday]]></category><category><![CDATA[Microsoft]]></category><category><![CDATA[Vulnerabilities]]></category><category><![CDATA[Malware]]></category><category><![CDATA[Cybersecurity News]]></category><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Wed, 15 Apr 2026 20:18:10 GMT</pubDate><media:content url="https://ghost5.storage.googleapis.com/2026/04/april-2026-2-1.png" medium="image"/><content:encoded><![CDATA[<img src="https://ghost5.storage.googleapis.com/2026/04/april-2026-2-1.png" alt="April 2026 Patch Tuesday: Massive Fixes for Microsoft, Chrome, and Adobe"><p>Patch Tuesday is back, and this month, it is an absolute <strong>mammoth</strong>. If you have been putting off those system updates, now is the time to take action. </p><p>Microsoft has just rolled out software updates to fix a staggering <strong>167 security vulnerabilities</strong> across its Windows operating systems and related software. </p><blockquote class="kg-blockquote-alt"><strong>This marks the second-largest Patch Tuesday in the company&apos;s history.</strong></blockquote><p>But Microsoft is not the only tech giant patching critical holes this month. We are also tracking emergency zero-day updates for Google Chrome and Adobe Reader. </p><p>Let us dive into the key vulnerabilities you need to know about and how to secure your network today.</p><p><a href="https://msrc.microsoft.com/update-guide/?ref=carlscloud.com"><strong>April 2026 - Microsoft Security Update Guide</strong></a></p><h3 id="critical-microsoft-updates-sharepoint-and-bluehammer">Critical Microsoft Updates: SharePoint and BlueHammer</h3><p>With 167 fixes, Microsoft&apos;s April 2026 release is massive. It includes nearly 60 browser vulnerabilities alone. According to Adam Barnett, lead software engineer at Rapid7, this sets a new record in that category. Barnett notes that it might be tempting to tie this sudden spike to the recent buzz around Project Glasswing&#x2014;a highly anticipated, unreleased AI capability from Anthropic that reportedly excels at finding bugs. However, since Microsoft Edge is based on Chromium, the Chromium maintainers are acknowledging a wide range of researchers for these vulnerabilities. Still, Barnett safely concludes that this increase in volume is driven by ever-expanding AI capabilities, and we should expect vulnerability reporting to keep growing as AI models become more capable.</p><p>Among these numerous updates, two critical Microsoft flaws demand your immediate attention:</p><p><strong>The SharePoint Server Zero-Day (CVE-2026-32201)</strong> <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32201?ref=carlscloud.com" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-32201</a>)</p><p>Microsoft is warning users that attackers are already actively targeting CVE-2026-32201 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32201?ref=carlscloud.com" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-32201</a>), a vulnerability within Microsoft SharePoint Server. This flaw allows malicious actors to spoof trusted content or interfaces over a network.</p><p>Mike Walters, president and co-founder of Action1, explains that this vulnerability can be used to deceive employees, partners, or customers by presenting falsified information right inside trusted SharePoint environments. Walters points out that this can enable phishing attacks, unauthorized data manipulation, or social engineering campaigns that lead to further compromise. Because there is active exploitation, organizational risk is significantly increased. If your organization relies on SharePoint, applying this update is critical.</p><p><strong>Windows Defender&apos;s BlueHammer Bug (CVE-2026-33825)</strong> &#xA0;(<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33825?ref=carlscloud.com" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-33825</a>)</p><p>Microsoft also addressed a privilege escalation vulnerability in Windows Defender dubbed &quot;BlueHammer,&quot; officially tracked as CVE-2026-33825 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33825?ref=carlscloud.com" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-33825</a>). Exploit code for this bug was recently published online by a security researcher who grew frustrated with Microsoft&apos;s response time. Fortunately, Will Dormann, senior principal vulnerability analyst at Tharros, confirmed that the public BlueHammer exploit code no longer works after installing today&apos;s patches.</p><h3 id="major-fixes-for-adobe-reader-and-google-chrome">Major Fixes for Adobe Reader and Google Chrome</h3><p>Microsoft was not the only company busy patching vulnerabilities this month. Whether you are viewing PDFs or just browsing the web, you need to ensure your third-party applications are up to date.</p><p><strong>Adobe Reader Emergency Update (CVE-2026-34621)</strong> (<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34621?ref=carlscloud.com" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-34621</a>)</p><p>Adobe released an emergency update on April 11 to fix an actively exploited flaw that could lead to remote code execution. Satnam Narang, senior staff research engineer at Tenable, noted that there are indications this specific zero-day vulnerability, CVE-2026-34621 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34621?ref=carlscloud.com" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-34621</a>), has been seeing active exploitation in the wild since at least November 2025. If you use Adobe Reader, ensure the software is updated immediately to close this dangerous backdoor.</p><p><strong>Google Chrome&apos;s Fourth Zero-Day of 2026 (CVE-2026-5281)</strong> <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5281?ref=carlscloud.com" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-5281</a>)</p><p>Finally, no matter what browser you use to surf the web, it is vital to completely close out and restart it periodically. It is easy to put off&#x2014;especially if you have dozens of tabs open&#x2014;but restarting is the only way to ensure updates actually install. For instance, a Google Chrome update released earlier this month fixed 21 security holes, including a high-severity zero-day flaw tracked as CVE-2026-5281 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5281?ref=carlscloud.com" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-5281</a>). </p><blockquote><em><strong>*This marked Chrome&apos;s fourth zero-day patch of 2026.</strong></em></blockquote><p>This month&apos;s record-breaking patch load is a stark reminder of how quickly the cybersecurity landscape is evolving. With AI making it easier to discover software vulnerabilities, we can expect these massive update cycles to become the new normal.</p><p>Your next steps are simple: <strong>apply your Windows updates,</strong> check Adobe Reader for pending patches, and completely restart your web browsers.</p><h3 id="did-you-enjoy-carlscloud%E2%84%A2-today-and-did-i-help-you-at-all">Did you enjoy CarlsCloud&#x2122; today and did I help you at all?</h3><p>If so, <strong><a href="https://www.buymeacoffee.com/carlscloud?ref=carlscloud.com">buy me a coffee</a></strong> or just shoot me a <a href="https://www.linkedin.com/in/carlballenger/?ref=carlscloud.com"><strong>note via LinkedIn</strong></a> to say thanks it would mean a lot!</p>]]></content:encoded></item><item><title><![CDATA[Microsoft Patch Tuesday: March 2026 Edition]]></title><description><![CDATA[The Headlines: 84 Flaws and AI Discovery
Of the 84 CVEs patched this month, eight are rated as Critical and 76 as Important. The breakdown of vulnerability types is heavily weighted toward privilege escalation...]]></description><link>https://carlscloud.com/microsoft-patch-tuesday-march-2026-edition/</link><guid isPermaLink="false">69b1bf47213a090001101258</guid><category><![CDATA[AI News]]></category><category><![CDATA[AI Security]]></category><category><![CDATA[Patch Tuesday]]></category><category><![CDATA[microsoft-march-2026-patch-tuesday]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Wed, 11 Mar 2026 19:38:09 GMT</pubDate><media:content url="https://ghost5.storage.googleapis.com/2026/03/mar-2026-patch-tuesday.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://ghost5.storage.googleapis.com/2026/03/mar-2026-patch-tuesday.jpg" alt="Microsoft Patch Tuesday: March 2026 Edition"><p>It is that time yet again... &#xA0;Happy Patching!</p><p>The March 2026 security update bonanza from Microsoft has arrived, and while we are spared from the high-pressure &quot;zero-day&quot; madness seen in February, there is plenty here that demands immediate attention. </p><p>This month, Microsoft addressed <strong><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar?ref=carlscloud.com">84 security vulnerabilities</a></strong> across its ecosystem, including two publicly disclosed flaws and several critical issues affecting productivity tools like Office and SQL Server.</p><p>Whether you are a system administrator or a security-conscious user, this update highlights a significant shift in the threat landscape&#x2014;<strong>specifically the rise of AI in vulnerability discovery</strong>.</p><h2 id="summary-of-march-2026-vulnerabilities-at-sans">Summary of March 2026 vulnerabilities at SANS</h2><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+March+2026/32782?ref=carlscloud.com"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Microsoft Patch Tuesday March 2026 - SANS Internet Storm Center</div><div class="kg-bookmark-description">Microsoft Patch Tuesday March 2026, Author: Johannes Ullrich</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://isc.sans.edu/apple-touch-icon.png" alt="Microsoft Patch Tuesday: March 2026 Edition"><span class="kg-bookmark-author">SANS Internet Storm Center</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://isc.sans.edu/images/logos/isc/large.png" alt="Microsoft Patch Tuesday: March 2026 Edition"></div></a></figure><h3 id="the-headlines-84-flaws-and-ai-discovery">The Headlines: 84 Flaws and AI Discovery</h3><p>Of the 84 CVEs patched this month, eight are rated as <strong>Critical</strong> and 76 as <strong>Important</strong>. The breakdown of vulnerability types is heavily weighted toward privilege escalation:</p><blockquote><strong>Elevation of Privilege:</strong> 46 vulnerabilities (55% of the total)</blockquote><blockquote><strong>Remote Code Execution (RCE):</strong> 18 vulnerabilities</blockquote><blockquote><strong>Information Disclosure:</strong> 10 vulnerabilities</blockquote><blockquote><strong>Denial of Service:</strong> 4 vulnerabilities</blockquote><p>Notably, this month features <strong><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-21536?ref=carlscloud.com">CVE-2026-21536</a></strong>, a critical RCE bug in the Microsoft Devices Pricing Program. While Microsoft has already mitigated this on the backend (requiring no user action), it is historically significant as one of the first vulnerabilities identified by an autonomous AI penetration testing agent (XBOW).</p><h2 id="critical-vulnerabilities-to-prioritize">Critical Vulnerabilities to Prioritize</h2><h3 id="microsoft-office-excel">Microsoft Office &amp; Excel</h3><p>As is often the case, the most immediate risk to end-users lies in Microsoft Office. Two critical Remote Code Execution vulnerabilities, <strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26110?ref=carlscloud.com">CVE-2026-26110</a></strong> and <strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26113?ref=carlscloud.com">CVE-2026-26113</a></strong>, can be triggered simply by viewing a malicious email or file in the <strong>Preview Pane</strong>.</p><p>Additionally, <strong><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26144?ref=carlscloud.com">CVE-2026-26144</a></strong> is a critical information disclosure flaw in Excel. In a corporate environment where Excel files often house sensitive financial data, this cross-site scripting (XSS) vulnerability could allow attackers to exfiltrate data silently.</p><h3 id="sql-server-elevation-of-privilege">SQL Server Elevation of Privilege</h3><p><strong><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-21262?ref=carlscloud.com">CVE-2026-21262</a></strong> is a publicly disclosed flaw that allows an authorized attacker to elevate their privileges to <strong>sysadmin</strong> over a network. While it requires low-level privileges to start, the leap to sysadmin makes this a top priority for any organization running SQL Server 2016 or later.</p><blockquote><strong>Key Takeaway:</strong> Even without active &quot;in-the-wild&quot; exploitation reported yet, the public disclosure of these flaws means the &quot;clock is ticking&quot; for defenders to apply patches before exploit code becomes widely available.</blockquote><h2 id="publicly-disclosed-zero-days">Publicly Disclosed Zero-Days</h2><p>Two vulnerabilities were known to the public before a patch was available this month:</p><p><strong><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-21262?ref=carlscloud.com">CVE-2026-21262:</a></strong> The SQL Server elevation flaw mentioned above.</p><p><strong><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-26127?ref=carlscloud.com">CVE-2026-26127</a>:</strong> A Denial of Service (DoS) vulnerability affecting applications running on .NET 9.0 and 10.0.</p><h2 id="official-microsoft-resources-downloads">Official Microsoft Resources &amp; Downloads</h2><p>To secure your environment, refer to the official documentation and update catalogs provided by Microsoft:</p><p><strong>Official Summary:</strong> <a href="https://msrc.microsoft.com/update-guide?ref=carlscloud.com" rel="noopener">Microsoft Security Update Guide (March 2026)</a></p><p><strong>Windows 11 Hotpatch:</strong> <a href="https://support.microsoft.com/en-us/topic/march-10-2026-hotpatch-kb5079420-os-builds-26200-7979-and-26100-7979-752485e9-41c1-4628-ad1a-7538dba503e3?ref=carlscloud.com" rel="noopener">KB5079420 Release Notes</a></p><p><strong>SQL Server Update:</strong> <a href="https://support.microsoft.com/en-us/topic/kb5077465-description-of-the-security-update-for-sql-server-2022-gdr-march-10-2026-c8f80978-e707-45d3-b924-6a168bd8e3c0?ref=carlscloud.com" rel="noopener">KB5077465 (SQL Server 2022)</a></p><p><strong>Office 2016 Update:</strong> <a href="https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-office-2016-march-10-2026-kb5002838-de57438f-2790-4e9b-98a8-c102f1628191?ref=carlscloud.com" rel="noopener">KB5002838 Security Update</a></p><p>While the lack of exploited zero-days is a welcome relief compared to last month, the high volume of privilege escalation bugs and the &quot;Preview Pane&quot; risks in Office mean that &quot;business as usual&quot; patching isn&apos;t enough. Organizations should prioritize their SQL Server and Office deployments immediately.</p><h3 id="are-your-systems-up-to-date">Are your systems up to date? </h3><p>Check your Windows Update settings or your WSUS/Intune consoles to ensure these critical fixes are being deployed. </p><h3 id="did-you-enjoy-carlscloud%E2%84%A2-today-and-did-i-help-you-at-all">Did you enjoy CarlsCloud&#x2122; today and did I help you at all?</h3><p>If so, <strong><a href="https://www.buymeacoffee.com/carlscloud?ref=carlscloud.com">buy me a coffee</a></strong> or just shoot me a <a href="https://www.linkedin.com/in/carlballenger/?ref=carlscloud.com"><strong>note via LinkedIn</strong></a> to say thanks it would mean a lot!</p>]]></content:encoded></item><item><title><![CDATA[Securing MCP Servers: A Practical Guide to Safe AI Integrations]]></title><description><![CDATA[MCP servers act as the critical connective tissue between AI assistants and your organization’s APIs]]></description><link>https://carlscloud.com/securing-mcp-servers-a-practical-guide-to-safe-ai-integrations/</link><guid isPermaLink="false">699e5f706ed54700015253d4</guid><category><![CDATA[AI News]]></category><category><![CDATA[MCP]]></category><category><![CDATA[AI Security]]></category><category><![CDATA[Google Cloud]]></category><category><![CDATA[AI Tools]]></category><category><![CDATA[AI]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Wed, 25 Feb 2026 02:49:23 GMT</pubDate><content:encoded><![CDATA[<p>MCP (Model Context Protocol) is the big newsworthy subject in the AI world recently. &#xA0;Read below to get recent OWASP released GenAI information as it applies to the added information security headaches for CISOs and Infosec managers everywhere... &#xA0;Godspeed!</p><p>Artificial intelligence is no longer just answering questions in a chat window; it is actively performing tasks, writing code, and interacting with our external tools. At the heart of this &quot;agentic AI&quot; revolution is the <strong>Model Context Protocol (MCP)</strong>. </p><blockquote><strong>MCP servers act as the critical connective tissue between AI assistants and your organization&#x2019;s APIs, tools, and data sources.</strong></blockquote><p><strong>FREE DOWNLOAD:</strong> &#xA0;<strong><a href="https://genai.owasp.org/resource/a-practical-guide-for-secure-mcp-server-development/?ref=carlscloud.com">OWASP Sourced Reference</a></strong></p>
        <div class="kg-card kg-file-card kg-file-card-medium">
            <a class="kg-file-card-container" href="https://carlscloud.com/content/files/2026/02/A-Practical-Guide-for-Secure-MCP-Server-Development.v.1.0.pdf" title="Download" download>
                <div class="kg-file-card-contents">
                    <div class="kg-file-card-title">A Practical Guide for Secure MCP Server Developmentv10</div>
                    
                    <div class="kg-file-card-metadata">
                        <div class="kg-file-card-filename">A-Practical-Guide-for-Secure-MCP-Server-Development.v.1.0.pdf</div>
                        <div class="kg-file-card-filesize">623 KB</div>
                    </div>
                </div>
                <div class="kg-file-card-icon">
                    <svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><defs><style>.a{fill:none;stroke:currentColor;stroke-linecap:round;stroke-linejoin:round;stroke-width:1.5px;}</style></defs><title>download-circle</title><polyline class="a" points="8.25 14.25 12 18 15.75 14.25"/><line class="a" x1="12" y1="6.75" x2="12" y2="18"/><circle class="a" cx="12" cy="12" r="11.25"/></svg>
                </div>
            </a>
        </div>
        <blockquote><strong>.....as we know...but with great power comes a drastically expanded attack surface.</strong> </blockquote><p>Because MCP servers facilitate complex, multi-step actions on behalf of users, a single vulnerability here can be catastrophic. If you&apos;re building or integrating AI agents, securing your MCP infrastructure isn&apos;t just an afterthought&#x2014;it&apos;s a fundamental requirement.</p><p>Let&apos;s dive into why securing MCP servers is uniquely challenging and explore actionable guidance for keeping your AI ecosystems safe.</p><h2 id="why-mcp-servers-arent-just-traditional-apis">Why MCP Servers Aren&apos;t Just &quot;Traditional APIs&quot;</h2><p>It&#x2019;s tempting to treat an MCP server like any other REST or GraphQL API you&#x2019;ve built in the past. However, doing so ignores the unique mechanics of how AI assistants interact with external systems. MCP servers require a different security paradigm for a few key reasons:</p><h2 id="delegated-user-permissions">Delegated User Permissions</h2><p>AI agents typically act on behalf of a human user, meaning the MCP server must flawlessly manage delegated permissions without accidentally granting the AI &quot;superuser&quot; access to your data.</p><h2 id="dynamic-tool-based-architectures">Dynamic Tool-Based Architectures</h2><p>Unlike predictable API endpoints, MCP servers provide tools that Large Language Models (LLMs) can choose to invoke dynamically based on conversational context.</p><h2 id="chained-tool-calls">Chained Tool Calls</h2><p>LLMs often string together multiple tool calls to achieve a goal. A malicious prompt could trick the AI into chaining calls in a way the developer never intended, bypassing logical security boundaries.</p><blockquote>&quot;Unlike traditional APIs, MCP servers operate with delegated user permissions, dynamic tool-based architectures, and chained tool calls, increasing the potential impact of a single vulnerability.&quot;</blockquote><h2 id="5-best-practices-for-secure-mcp-server-development">5 Best Practices for Secure MCP Server Development</h2><p>To safely enable powerful, tool-integrated AI capabilities, platform engineers and developers need to build defense-in-depth directly into their MCP servers. Based on the latest guidance from the OWASP Gen AI Security Project, here are the five core pillars of secure MCP development:</p><h3 id="build-a-secure-by-design-architecture">Build a Secure-by-Design Architecture</h3><p>Start by enforcing the principle of least privilege at the architectural level. Ensure your MCP server only exposes the absolute minimum set of tools and data required for the AI to do its job. Consider implementing human-in-the-loop (HITL) approval gates for any tool calls that mutate data or perform sensitive actions.</p><h3 id="enforce-strong-authentication-authorization">Enforce Strong Authentication &amp; Authorization</h3><p>Never trust the AI assistant to handle authorization. The MCP server itself must verify the identity of the end-user initiating the prompt and strictly enforce access controls based on that specific user&apos;s permissions, not just the service account of the AI application.</p><h3 id="implement-strict-data-validation">Implement Strict Data Validation</h3><p>LLMs are highly susceptible to prompt injection, and they pass those injections directly down to your tools.</p><ul><li><strong>Input Validation:</strong> Strictly sanitize and validate all arguments passed to your MCP tools by the LLM.</li><li><strong>Output Validation:</strong> Sanitize the data your MCP server returns to the LLM to prevent data exfiltration or secondary injection attacks.</li></ul><h3 id="guarantee-session-isolation">Guarantee Session Isolation</h3><p>In a multi-tenant environment, AI interactions must be strictly isolated. Ensure that one user&apos;s context, data, or tool executions can never bleed into another user&apos;s session. Treat every LLM interaction as a stateless, strictly scoped transaction.</p><h3 id="deploy-in-hardened-environments">Deploy in Hardened Environments</h3><p>Your code is only as secure as the environment it runs in. Deploy MCP servers in isolated, hardened containers with strict network egress policies. Since MCP servers act as a bridge to internal data, restricting what internal networks the server can talk to limits the blast radius of a potential breach.</p><h2 id="who-needs-to-pay-attention">Who Needs to Pay Attention?</h2><h3 id="securing-mcp-servers-is-a-cross-functional-responsibility">Securing MCP servers is a cross-functional responsibility.</h3><ul><li><strong>Software Architects</strong> need to design secure boundaries between the LLM and internal systems.</li><li><strong>Platform Engineers</strong> must provision hardened deployment environments and secure network routing.</li><li><strong>Development Teams</strong> are responsible for writing strict validation and authorization logic for every single tool exposed via MCP.</li></ul><p>The <strong>Model Context Protocol</strong> is unlocking incredible new capabilities for AI, transforming passive chatbots into proactive digital assistants. However, organizations cannot afford to blindly bridge LLMs into their secure networks. By embracing secure architecture, strict validation, and robust session isolation, you can confidently reduce your risk while adopting agentic AI.</p><h3 id="3-resources-for-additional-context-on-mcp-security">3 resources for additional context on MCP security</h3><ul><li><strong><a href="https://modelcontextprotocol.io/docs/tutorials/security/security_best_practices?ref=carlscloud.com" rel="noopener">Official MCP Security Best Practices</a> </strong></li></ul><p>The official guide from the protocol&apos;s creators detailing architectural requirements, secure consent flows, and the critical differences between securing local versus remote servers.</p><ul><li><strong><a href="https://owasp.org/www-project-mcp-top-10/?ref=carlscloud.com" rel="noopener">OWASP MCP Top 10</a> </strong></li></ul><p>An authoritative breakdown of the most critical security vulnerabilities facing MCP environments, including specific threat vectors like Token Mismanagement, Tool Poisoning, and Prompt Injection.</p><ul><li><strong><a href="https://www.redhat.com/en/blog/model-context-protocol-mcp-understanding-security-risks-and-controls?ref=carlscloud.com" rel="noopener">Red Hat: Understanding MCP Security Risks and Controls</a> </strong></li></ul><p>A practical, developer-focused overview of real-world risks in agentic AI&#x2014;such as unauthorized command execution and &quot;confused deputy&quot; attacks&#x2014;alongside concrete mitigation strategies.</p>]]></content:encoded></item><item><title><![CDATA[Microsoft Patch Tuesday (Feb 2026): 6 Zero-Days Exploited & Critical Secure Boot Updates]]></title><description><![CDATA[The headline concern for administrators this month is the patch for six actively exploited zero-day vulnerabilities, three of which were publicly disclosed prior to the fix.]]></description><link>https://carlscloud.com/microsoft-patch-tuesday-feb-2026-6-zero-days-exploited-critical-secure-boot-updates/</link><guid isPermaLink="false">698cdd0f0787c70001729b20</guid><category><![CDATA[Microsoft]]></category><category><![CDATA[microsoft-february-2026-patch-tuesday]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Wed, 11 Feb 2026 20:06:16 GMT</pubDate><content:encoded><![CDATA[<p>Microsoft&#x2019;s February 2026 Patch Tuesday is a heavy hitter, addressing <strong><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Feb?ref=carlscloud.com">58 vulnerabilities</a></strong> across its ecosystem. </p><p>The headline concern for administrators this month is the patch for <strong>six actively exploited zero-day vulnerabilities</strong>, three of which were publicly disclosed prior to the fix.</p><p>In addition to the security flaws, Microsoft has initiated a critical infrastructure update: the rollout of new <strong>Secure Boot certificates</strong> to replace the 2011 keys set to expire in June 2026.</p><h2 id="the-numbers">The Numbers</h2><ul><li><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Feb?ref=carlscloud.com"><strong>Total Flaws:</strong> 58 (*59 per article) </a></li><li><strong>Zero-Days (Actively Exploited):</strong> 6</li><li><strong>Critical Severity:</strong> 5 (3 Elevation of Privilege, 2 Information Disclosure)</li><li><strong>RCE Vulnerabilities:</strong> 12</li></ul><h2 id="the-6-zero-days-under-attack">The 6 Zero-Days Under Attack</h2><p>Immediate attention is required for these six vulnerabilities currently being leveraged by threat actors:</p><h3 id="1-cve-2026-21510-windows-shell"> 1. &#xA0;<a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21510?ref=carlscloud.com">CVE-2026-21510 (Windows Shell)</a></h3><blockquote>A security feature bypass that circumvents SmartScreen and Windows Shell prompts. Attackers use malicious links or shortcut files to execute content without user warnings (Mark of the Web bypass)</blockquote><h3 id="2-cve-2026-21513-mshtml-platform">2. &#xA0;<a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21513?ref=carlscloud.com">CVE-2026-21513 (MSHTML Platform)</a></h3><blockquote>A security feature bypass allowing unauthorized actors to circumvent network-based security features.</blockquote><h3 id="3-cve-2026-21514-microsoft-word">3. &#xA0;<a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21514?ref=carlscloud.com">CVE-2026-21514 (Microsoft Word)</a></h3><blockquote>Exploits a weakness in how Word handles COM/OLE controls, bypassing OLE mitigations. It requires a user to open a malicious file (Preview Pane is safe).</blockquote><h3 id="4-cve-2026-21519-desktop-window-manager">4. &#xA0;<a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21519?ref=carlscloud.com">CVE-2026-21519 (Desktop Window Manager)</a></h3><blockquote>An Elevation of Privilege (EoP) flaw allowing attackers to gain <strong>SYSTEM</strong> privileges.</blockquote><h3 id="5-cve-2026-21525-windows-remote-access-connection-manager">5. &#xA0;<a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21525?ref=carlscloud.com">CVE-2026-21525 (Windows Remote Access Connection Manager)</a></h3><blockquote>A Denial of Service (DoS) vulnerability via null pointer dereference. Originally discovered by 0patch in a malware repository in late 2025.</blockquote><h3 id="6-cve-2026-21533-windows-remote-desktop-services">6. &#xA0;<a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21533?ref=carlscloud.com">CVE-2026-21533 (Windows Remote Desktop Services)</a></h3><blockquote>An EoP flaw that allows an authenticated attacker to modify service configuration keys and add a new user to the local <strong>Administrator</strong> group.</blockquote><h2 id="critical-infrastructure-secure-boot-certificate-rotation">Critical Infrastructure: Secure Boot Certificate Rotation</h2><p>Microsoft is replacing the original 2011 Secure Boot certificates, which expire in June 2026. &#xA0;This update (<a href="https://support.microsoft.com/en-us/topic/february-10-2026-kb5077181-os-builds-26200-7840-and-26100-7840-f0fa9e54-a22a-4a06-96b6-bf5b2aded506?ref=carlscloud.com">KB5077181</a> &amp; <a href="https://support.microsoft.com/en-us/topic/february-10-2026-kb5075941-os-build-22631-6649-25716be6-475b-4e2e-9ece-499d218c3b8e?ref=carlscloud.com">KB5075941</a> for Windows 11) includes a phased rollout. Devices will only receive the new certificates after broadcasting &quot;sufficient successful update signals&quot; to prevent boot failures.</p><h2 id="other-vendor-updates">Other Vendor Updates</h2><ul><li><strong>Adobe:</strong> Updates for After Effects, InDesign, and Substance 3D (no zero-days).</li><li><strong>CISA:</strong> Issued a Binding Operational Directive for federal agencies regarding End-of-Support network edge devices.</li><li><strong>Cisco &amp; Fortinet:</strong> Security updates released for Secure Web Appliance and FortiOS/FortiSandbox respectively.</li></ul>]]></content:encoded></item><item><title><![CDATA[The Asset Class of "SEO Content" is Being Devalued: How to Pivot to Information Gain]]></title><description><![CDATA[The Synapse platform offers 3 Free Credits to new accounts to test this AI SERP Agent engine today with no obligation.]]></description><link>https://carlscloud.com/the-asset-class-of-seo-content-is-being-devalued-how-to-pivot-to-information-gain/</link><guid isPermaLink="false">6983af92b58da20001282807</guid><category><![CDATA[AI Tools]]></category><category><![CDATA[AI]]></category><category><![CDATA[AI News]]></category><category><![CDATA[AI Security]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Wed, 04 Feb 2026 21:19:59 GMT</pubDate><media:content url="https://ghost5.storage.googleapis.com/2026/02/semantic-analysis-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://ghost5.storage.googleapis.com/2026/02/semantic-analysis-1.jpg" alt="The Asset Class of &quot;SEO Content&quot; is Being Devalued: How to Pivot to Information Gain"><p>For the better part of a decade, the contract between business owners and Google was simple: you provide the content, they provide the traffic. &#xA0;That contract has been quietly rewritten.</p><h2 id="access-the-synapse-v2-beta"><a href="https://synapse.cloudnerve.com/?ref=carlscloud.com">Access the Synapse v2 Beta</a></h2><figure class="kg-card kg-image-card"><a href="https://synapse.cloudnerve.com/?ref=carlscloud.com"><img src="https://ghost5.storage.googleapis.com/2026/02/synapsev2-1.jpg" class="kg-image" alt="The Asset Class of &quot;SEO Content&quot; is Being Devalued: How to Pivot to Information Gain" loading="lazy" width="799" height="721"></a></figure><p>If you are a digital entrepreneur or an SEO strategist, you have likely noticed a disturbing trend in your Q1 analytics. Your rankings haven&apos;t dropped&#x2014;you might still be holding the #1 or #2 organic position&#x2014;but your click-through rate (CTR) is bleeding out.</p><p>This is the economic reality of the <strong>AI Overview (AIO)</strong>. We have entered an era where &quot;search&quot; is being replaced by &quot;synthesis.&quot; For businesses relying on organic traffic, the goalpost has moved from &quot;visibility&quot; to &quot;citation.&quot;</p><h3 id="the-pivot-from-keywords-to-information-gain">The Pivot: From Keywords to &quot;Information Gain&quot;</h3><p>The traditional SEO playbook&#x2014;keyword density, backlink velocity, and technical hygiene&#x2014;is no longer sufficient to secure the top spot in a generative AI world. Large Language Models (LLMs) like Gemini don&apos;t just match strings of text; they assess <strong><em>Semantic Density</em></strong>.</p><p>The algorithm is prioritizing <strong><em>Information Gain</em></strong>. It is looking for content that adds specific value&#x2014;unique entities, data points, or relationships&#x2014;that isn&apos;t found elsewhere. If your content is just a polished version of what everyone else is saying, the AI summarizes it, serves the answer to the user, and you get zero clicks.</p><p>To survive, you cannot just be relevant; you must be the <strong>primary source</strong> the AI is forced to cite.</p><h2 id="reverse-engineering-the-black-box">Reverse-Engineering the Black Box</h2><blockquote>Recognizing this shift, the team at <a href="https://synapse.cloudnerve.com/?ref=carlscloud.com">CloudNerve.com</a> has developed a tool specifically for this new landscape: <strong><a href="https://synapse.cloudnerve.com/?ref=carlscloud.com">Synapse</a></strong>.</blockquote><p>This isn&apos;t a standard SEO audit tool. It is an engine designed to reverse-engineer the &quot;why&quot; behind the AI&apos;s choices. It helps business owners move from guessing to data-driven execution.</p><h2 id="the-synapse-strategy">The Synapse Strategy:</h2><h3 id="gap-analysis-over-keyword-research">Gap Analysis over Keyword Research</h3><blockquote>Synapse compares your content (the &quot;Challenger&quot;) against the AI Overview (the &quot;Winner&quot;) to identify the &quot;dark matter&quot;&#x2014;the specific entities and concepts the AI values that your content is missing.</blockquote><h3 id="automated-semantic-density">Automated Semantic Density</h3><blockquote>Using Gemini 2.0 Flash, the tool&#x2019;s &quot;Semantic Rewrite Engine&quot; doesn&apos;t just suggest changes; it generates high-density, fact-rich content blocks designed to plug these gaps instantly.</blockquote><h3 id="visualizing-the-deficit">Visualizing the Deficit</h3><blockquote>A side-by-side visual diff allows you to see exactly where your content lacks the depth required to trigger an AI citation.</blockquote><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2026/02/content-rewrite-1.jpg" class="kg-image" alt="The Asset Class of &quot;SEO Content&quot; is Being Devalued: How to Pivot to Information Gain" loading="lazy" width="2138" height="1293"></figure><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2026/02/content-rewrite-2.jpg" class="kg-image" alt="The Asset Class of &quot;SEO Content&quot; is Being Devalued: How to Pivot to Information Gain" loading="lazy" width="1102" height="1384"></figure><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2026/02/semantic-analysis.jpg" class="kg-image" alt="The Asset Class of &quot;SEO Content&quot; is Being Devalued: How to Pivot to Information Gain" loading="lazy" width="2325" height="1027"></figure><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2026/02/content-rewrite-3.jpg" class="kg-image" alt="The Asset Class of &quot;SEO Content&quot; is Being Devalued: How to Pivot to Information Gain" loading="lazy" width="1531" height="267"></figure><h2 id="the-beta-opportunity">The Beta Opportunity</h2><p>For entrepreneurs and agencies looking to future-proof their traffic sources, Synapse is currently in open Beta. This is an opportunity to stress-test your current high-value pages against the new reality of AI Search.</p><p>The <a href="https://synapse.cloudnerve.com/?ref=carlscloud.com">Synapse </a>platform offers <strong><a href="https://synapse.cloudnerve.com/?ref=carlscloud.com">3 Free Credits</a></strong> to new accounts to test this AI SERP Agent engine today with no obligation.</p><p>You can continue optimizing for the internet of 2015, or you can start optimizing for the machine that is currently reading the world.</p><blockquote class="kg-blockquote-alt"><strong><a href="https://synapse.cloudnerve.com/?ref=carlscloud.com">Access the Synapse v2 Beta</a></strong></blockquote><p><strong><a href="https://synapse.cloudnerve.com/?ref=carlscloud.com">Synapse v2 Beta - UPDATE: MCP Developer API Keys Now Available!</a></strong></p><figure class="kg-card kg-image-card"><a href="https://synapse.cloudnerve.com/?ref=carlscloud.com"><img src="https://ghost5.storage.googleapis.com/2026/02/mcp-synapse-apikeys.jpg" class="kg-image" alt="The Asset Class of &quot;SEO Content&quot; is Being Devalued: How to Pivot to Information Gain" loading="lazy" width="1022" height="500"></a></figure>]]></content:encoded></item><item><title><![CDATA[FBI Seizes RAMP: Notorious Ransomware Forum Taken Offline]]></title><description><![CDATA[The Seizure Operation
Visitors to the RAMP dark web and clearnet domains are now greeted with a stark seizure notice.]]></description><link>https://carlscloud.com/fbi-seizes-ramp-notorious-ransomware-forum-taken-offline/</link><guid isPermaLink="false">697aac1738d19c000188e883</guid><category><![CDATA[Cybersecurity]]></category><category><![CDATA[FBI]]></category><category><![CDATA[CyberCrime]]></category><category><![CDATA[Cybersecurity News]]></category><category><![CDATA[Hacker News]]></category><category><![CDATA[Hacking]]></category><category><![CDATA[Ransomware]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Thu, 29 Jan 2026 00:52:09 GMT</pubDate><media:content url="https://ghost5.storage.googleapis.com/2026/01/ramp-fbi-seizure-2.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://ghost5.storage.googleapis.com/2026/01/ramp-fbi-seizure-2.jpg" alt="FBI Seizes RAMP: Notorious Ransomware Forum Taken Offline"><p>In a significant blow to the global ransomware ecosystem, US law enforcement has successfully seized the domains of RAMP, a notorious cybercrime forum. Known as the Russian Anonymous Marketplace, RAMP served as a critical hub for ransomware-as-a-service (RaaS) gangs, initial access brokers, and extortionists. This takedown disrupts a major communication channel for digital criminals and marks another victory for federal authorities in the ongoing battle against organized cybercrime.</p><h3 id="the-seizure-operation">The Seizure Operation</h3><p>Visitors to the RAMP dark web and clearnet domains are now greeted with a stark seizure notice. The banner attributes the operation to the Federal Bureau of Investigation (FBI), in coordination with the US Attorney&apos;s Office for the Southern District of Florida and the Department of Justice&apos;s Computer Crime and Intellectual Property Section.</p><p>In a move that has become characteristic of recent law enforcement operations, the seizure page includes a bit of trolling aimed at the site&apos;s operators. The feds replaced the forum&apos;s content with a banner declaring it &quot;The Only Place Ransomware Allowed!&quot; accompanied by an image of Masha&#x2014;a character from the popular Russian animated series Masha and the Bear&#x2014;winking at the viewer. While the FBI has not officially commented on the specifics of the operation, DNS records confirm that the domains are now in the custody of federal authorities.</p><h3 id="the-administrators-response">The Administrator&apos;s Response</h3><p>The takedown has been confirmed by one of the forum&apos;s alleged operators, who uses the handle &quot;Stallman.&quot; In a post on the XSS hacking forum, which has circulated widely on social media, Stallman acknowledged the loss of the platform.</p><blockquote class="kg-blockquote-alt">&quot;This event destroyed years of my work to create the most free forum in the world, and although I hoped this day would never come, deep down I always understood that it was possible,&quot; Stallman wrote. &quot;This is the risk we all take.&quot;</blockquote><p>Unlike some cybercriminals who immediately vow to rebuild, Stallman indicated a shift in operations. He stated that he would not attempt to create a new forum but would instead continue his core business of buying network access.</p><h3 id="what-was-ramp">What Was RAMP?</h3><p>RAMP was more than just a discussion board; it was a specialized marketplace catering to the elite of the cybercriminal underworld. It provided a venue for:</p><ul><li>Ransomware-as-a-service (RaaS) gangs to recruit affiliates.</li><li>Initial access brokers to sell entry points into compromised corporate networks.</li><li>Extortionists to coordinate attacks and share tactics.</li></ul><p>By removing this platform, law enforcement has forced these actors to scramble for alternative venues, disrupting their operations and sowing distrust within the community.</p><p>The seizure of RAMP serves as a powerful reminder of the reach of US law enforcement, even into the darkest corners of the web. While the forum&apos;s administrator claims his &quot;core business remains unchanged,&quot; the destruction of the platform represents a significant loss of infrastructure and trust for the ransomware community. As authorities continue to dismantle these digital marketplaces, cybercriminals are finding fewer safe havens to conduct their illicit business.</p><h3 id="other-related-article-resources">Other Related Article Resources:</h3><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://arstechnica.com/security/2026/01/site-catering-to-online-criminals-has-been-seized-by-the-fbi/?ref=carlscloud.com"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Site catering to online criminals has been seized by the FBI</div><div class="kg-bookmark-description">One of the last holdouts for ransomware discussions, RAMP is taken down.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://cdn.arstechnica.net/wp-content/uploads/2016/10/cropped-ars-logo-512_480-300x300.png" alt="FBI Seizes RAMP: Notorious Ransomware Forum Taken Offline"><span class="kg-bookmark-author">Ars Technica</span><span class="kg-bookmark-publisher">Dan Goodin</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://cdn.arstechnica.net/wp-content/uploads/2025/10/network-outage.jpg" alt="FBI Seizes RAMP: Notorious Ransomware Forum Taken Offline"></div></a></figure><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/?ref=carlscloud.com"><div class="kg-bookmark-content"><div class="kg-bookmark-title">FBI seizes RAMP cybercrime forum used by ransomware gangs</div><div class="kg-bookmark-description">The FBI has seized the notorious RAMP cybercrime forum, a platform used to advertise a wide range of malware and hacking services, and one of the few remaining forums that openly allowed the promotion of ransomware operations.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://www.bleepstatic.com/icons/apple-touch-icon.png" alt="FBI Seizes RAMP: Notorious Ransomware Forum Taken Offline"><span class="kg-bookmark-author">BleepingComputer</span><span class="kg-bookmark-publisher">Lawrence Abrams</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://www.bleepstatic.com/content/hl-images/2022/12/16/FBI__headpic.jpg" alt="FBI Seizes RAMP: Notorious Ransomware Forum Taken Offline"></div></a></figure>]]></content:encoded></item><item><title><![CDATA[Kimwolf Botnet: The Silent Threat Inside Corporate and Government Networks]]></title><description><![CDATA[While the sheer size of the botnet (estimated at 1.8 to 2 million infected devices) is alarming, the primary concern is its ability to bypass traditional perimeter defenses.]]></description><link>https://carlscloud.com/kimwolf-botnet-the-silent-threat-inside-corporate-and-government-networks/</link><guid isPermaLink="false">696fe5be2c38c600012c110a</guid><category><![CDATA[Attack Vectors]]></category><category><![CDATA[CyberAttacks]]></category><category><![CDATA[Cybersecurity News]]></category><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Vulnerabilities]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Tue, 20 Jan 2026 20:50:38 GMT</pubDate><media:content url="https://ghost5.storage.googleapis.com/2026/01/kim-vuln.jpg" medium="image"/><content:encoded><![CDATA[<h2></h2><img src="https://ghost5.storage.googleapis.com/2026/01/kim-vuln.jpg" alt="Kimwolf Botnet: The Silent Threat Inside Corporate and Government Networks"><p>A new and aggressive botnet known as <strong>Kimwolf</strong> has rapidly infected over two million devices globally, exposing a critical vulnerability in how internal networks&#x2014;from home offices to corporate and government environments&#x2014;are secured.</p><h3 id="the-threat-landscape">The Threat Landscape</h3><p>Security researchers from Synthient and the Chinese firm XLab have tracked the explosive growth of Kimwolf, which primarily targets <strong>unofficial Android TV streaming boxes</strong> and internet-connected digital photo frames. These low-cost devices, often sold on major e-commerce platforms like Amazon and Walmart, frequently ship with no built-in security or authentication.</p><p>While the sheer size of the botnet (estimated at 1.8 to 2 million infected devices) is alarming, the primary concern is its ability to bypass traditional perimeter defenses.</p><p><a href="https://www.infoblox.com/blog/threat-intelligence/kimwolf-howls-from-inside-the-enterprise/?ref=carlscloud.com">Infoblox</a> reviewed its customer traffic and found 25% made queries to Kimwolf related domain names since Oct. 1st , 2025.</p><blockquote>&#x201C;To be clear, this suggests that nearly 25% of customers had at least one device that was an endpoint in a residential proxy service targeted by Kimwolf operators,&#x201D; Infoblox <a href="https://www.infoblox.com/blog/threat-intelligence/kimwolf-howls-from-inside-the-enterprise/?ref=carlscloud.com" rel="noopener">explained</a>. &#x201C;Such a device, maybe a phone or a laptop, was essentially co-opted by the threat actor to probe the local network for vulnerable devices. A query means a scan was made, not that new devices were compromised. Lateral movement would fail if there were no vulnerable devices to be found or if the DNS resolution was blocked.&#x201D;</blockquote><h3 id="mechanism-of-attack-tunneling-through-proxies">Mechanism of Attack: Tunneling Through Proxies</h3><p>Kimwolf utilizes a sophisticated method to breach local networks:</p><blockquote><strong>Residential Proxy Abuse:</strong> The botnet leverages &quot;residential proxy&quot; services&#x2014;networks that allow users to route traffic through legitimate residential IP addresses to anonymize their location.</blockquote><blockquote><strong>RFC-1918 Bypass:</strong> Researchers discovered that Kimwolf operators could manipulate Domain Name System (DNS) settings to target internal IP ranges (such as <code>192.168.x.x</code> or <code>10.x.x.x</code>). This allows attackers to &quot;tunnel&quot; back through a proxy user&apos;s connection and communicate directly with other devices on that user&apos;s <em>local</em> network.</blockquote><blockquote><strong>ADB Exploitation:</strong> Many infected Android devices ship with the <strong>Android Debug Bridge (ADB)</strong> enabled by default. This diagnostic tool, intended for manufacturing, leaves the device listening for unauthenticated commands. Attackers can simply connect to port 5555 and gain &quot;super user&quot; administrative access instantly.</blockquote><h3 id="government-and-corporate-implications">Government and Corporate Implications</h3><p>The threat extends beyond consumer living rooms. The ability to tunnel into local networks makes Kimwolf a potent tool for reconnaissance and lateral movement within enterprise and government environments.</p><p>Recent reports indicate that federal agencies, including the <strong>Drug Enforcement Administration (DEA)</strong>, are investigating incidents where hackers may have used similar proxy-tunneling techniques to gain unauthorized access to agency portals and law enforcement databases. This suggests that &quot;smart&quot; devices connected to guest or corporate networks could serve as trojan horses, bypassing firewalls to expose sensitive internal infrastructure.</p><h4 id="key-findings-and-attribution">Key Findings and Attribution</h4><ul><li><strong>Origin:</strong> The botnet is believed to be an evolution of the earlier <strong>Aisuru</strong> botnet, with code analysis revealing shared infrastructure and specific &quot;easter eggs&quot; referencing security researchers.</li><li><strong>Infrastructure:</strong> The botnet relies heavily on the <strong>IPIDEA</strong> proxy network. Investigations revealed a near-perfect overlap between new Kimwolf infections and IP addresses sold by IPIDEA.</li><li><strong>Monetization:</strong> Infected devices are monetized in multiple ways, including participation in massive Distributed Denial of Service (DDoS) attacks, ad fraud, and mass content scraping.</li></ul><h3 id="mitigation-recommendations">Mitigation Recommendations</h3><p>Security experts advise the following immediate steps:</p><blockquote><strong>Device Audit:</strong> Identify and remove unsanctioned &quot;grey market&quot; Android TV boxes or cheap IoT devices from the network.</blockquote><blockquote><strong>Network Segmentation:</strong> Strictly isolate IoT devices on a separate VLAN (Virtual Local Area Network) that cannot communicate with critical computers, servers, or sensitive data repositories.</blockquote><blockquote><strong>Disable ADB:</strong> If such devices must be used, ensure developer options and ADB are disabled.</blockquote><blockquote><strong>Proxy Blocking:</strong> Enterprise firewalls should block connections to known residential proxy services and restrict DNS resolution for internal IP ranges from external sources.</blockquote><h3 id="additional-resources">Additional Resources:</h3><p><strong><a href="https://blog.xlab.qianxin.com/kimwolf-botnet-en/?ref=carlscloud.com">XLab Technical Report: &quot;Kimwolf Exposed</a></strong></p><p>This is the primary technical source mentioned in the rewritten article. It details the botnet&apos;s command-and-control infrastructure, the specific &quot;easter eggs&quot; found in the code, and the methodology used to estimate the 1.8+ million infection count.</p><p><a href="https://www.quokka.io/blog/major-security-issues-digital-picture-frames?ref=carlscloud.com"><strong>Quokka Security Advisory: Uhale Digital Picture FramesLink</strong></a> </p><p>This report focuses specifically on the &quot;digital photo frame&quot; infection vector. It explains the vulnerabilities in the Uhale app and Android-based frames that allow Kimwolf to gain root access and persist on the network.</p><p><strong><a href="https://krebsonsecurity.com/2026/01/who-benefited-from-the-aisuru-and-kimwolf-botnets/?ref=carlscloud.com">KrebsOnSecurity: Part II &#x2013; Who Benefited from the Aisuru and Kimwolf Botnets?</a></strong></p><p>The follow-up investigation teased in the original article. This piece dives into the financial ecosystem behind the botnet, linking the operators to specific residential proxy providers like IPIDEA and analyzing the &quot;follow the money&quot; trail.</p>]]></content:encoded></item><item><title><![CDATA[Microsoft January 2026 Patch Tuesday: 114 Fixes & 3 Zero-Days]]></title><description><![CDATA[Microsoft kicks off 2026 with a massive security update, fixing 114 vulnerabilities and 3 zero-days. Here is what admins need to prioritize immediately.]]></description><link>https://carlscloud.com/microsoft-january-2026-patch-tuesday-114-fixes-3-zero-days/</link><guid isPermaLink="false">6966ab5ac978eb0001a2e9ce</guid><category><![CDATA[microsoft-january-2026-patch-tuesday]]></category><category><![CDATA[Microsoft]]></category><category><![CDATA[Patch Tuesday]]></category><category><![CDATA[Windows Server]]></category><category><![CDATA[Zero Day]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Tue, 13 Jan 2026 20:45:14 GMT</pubDate><media:content url="https://ghost5.storage.googleapis.com/2026/01/test3.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://ghost5.storage.googleapis.com/2026/01/test3.jpg" alt="Microsoft January 2026 Patch Tuesday: 114 Fixes &amp; 3 Zero-Days"><p></p><h2 id="welcome-to-the-first-patch-tuesday-of-2026">Welcome to the first Patch Tuesday of 2026. </h2><p></p><p><em>If you were hoping for a quiet start to the new year, Microsoft had other plans.</em></p><p>This month, Redmond has released a <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2026-patch-tuesday-fixes-3-zero-days-114-flaws/?ref=carlscloud.com">substantial security update addressing 114 vulnerabilities</a> across its ecosystem. The release is heavy on critical risks, patching 12 Critical flaws and, most importantly, 3 zero-day vulnerabilities&#x2014;one of which is already being actively exploited in the wild. </p><p>For system administrators and security teams, the holiday break is officially over. Here is everything you need to know to secure your environment this month.</p><h2 id="the-january-2026-breakdown">The January 2026 Breakdown</h2><p>The volume of patches this month is significantly higher than recent averages, signaling a busy year ahead for patch management.</p><ul><li><a href="https://cybersecuritynews.com/microsoft-patch-tuesday-january-2026/?ref=carlscloud.com"><strong>Total Vulnerabilities Fixed:</strong> 114</a></li><li><strong>Critical Vulnerabilities:</strong> 12</li><li><strong>Zero-Days:</strong> 3 (Includes actively exploited flaws)</li><li><strong>Remote Code Execution (RCE):</strong> 22</li></ul><p>The updates cover a wide range of products, including Windows, Office, SharePoint, .NET, and SQL Server. However, the most urgent attention should be directed toward the Windows Kernel, LSASS, and Office components.</p><p><strong>Priority 1: The Zero-Day Threats</strong></p><p>This month&apos;s most pressing issues are the zero-day vulnerabilities. These are flaws that were either publicly disclosed or exploited before a patch was available.</p><h3 id="actively-exploited-agere-modem-driver">Actively Exploited Agere Modem Driver</h3><p>Microsoft has patched an Elevation of Privilege (EoP) vulnerability in the built-in Agere modem drivers. While modem drivers might feel like legacy tech, they remain a viable attack vector in legacy codebases.</p><ul><li><strong>Risk:</strong> Attackers can abuse this to gain higher privileges on a compromised machine.</li><li><strong>Action:</strong> Verify the installation of KB5073724 immediately.</li></ul><p><strong>2. WinSqlite DLL Security Flaw</strong></p><p>A second zero-day involves the third-party WinSqlite DLL, a core component used by Windows for database operations. This flaw has been publicly disclosed, increasing the risk that threat actors will reverse-engineer the vulnerability to create exploits.</p><h3 id="critical-remote-code-execution-rce-risks">Critical Remote Code Execution (RCE) Risks</h3><p>Beyond the zero-days, massive RCE risks lurk in this update. If left unpatched, these could allow attackers to run arbitrary code on your network.</p><p><strong><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20854?ref=carlscloud.com">LSASS RCE (CVE-2026-20854)</a></strong></p><p>The Local Security Authority Subsystem Service (LSASS) is a favorite target for attackers (often used to dump credentials).</p><ul><li><strong>The Flaw:</strong> A <em>use-after-free</em> error that allows remote code execution over the network.</li><li><strong>Severity:</strong> Critical. This affects the core authentication mechanism of Windows.</li></ul><p><strong>Microsoft Office &amp; Excel RCEs</strong>The Office suite received multiple critical patches this month, specifically targeting:</p><ul><li><strong>Excel:</strong> Multiple pointer issues and integer underflows (e.g., CVE-2026-20957).</li><li><strong>Word:</strong> Out-of-bounds read vulnerabilities (CVE-2026-20944).</li></ul><p><em>Note: These Office exploits often rely on the Preview Pane. Disabling the Preview Pane in Outlook and Explorer can offer temporary mitigation until patches are deployed.</em></p><h2 id="important-admin-changes-for-2026">Important Admin Changes for 2026</h2><h3 id="windows-server-2025-kb-identifiers">Windows Server 2025 KB Identifiers</h3><p>Starting with this update, Microsoft is changing how it labels updates for its newest server OS. Windows Server 2025 will now have its own unique KB identifiers, separate from Windows 11 versions.</p><ul><li><strong>Why it matters:</strong> If you rely on automated scripts or manual catalog searches, ensure you are looking for the Server-specific KBs, or your deployments may fail.</li></ul><h3 id="secure-boot-certificate-renewal">Secure Boot Certificate Renewal</h3><p>Microsoft is rolling out updates to address expiring Secure Boot certificates. This is a phased rollout to prevent boot failures.</p><ul><li><strong>The Plan:</strong> Devices will receive new certificates only after they demonstrate &quot;sufficient successful update signals.&quot;</li><li><strong>Pro Tip:</strong> Do not force these updates manually unless necessary; let the automated servicing stack handle the prerequisite checks to avoid bricking bootloaders.</li></ul><p>January 2026 sets a serious tone for the year. With over 100 fixes and active exploitation in the wild, &quot;wait and see&quot; is not a viable strategy this month.</p><p><strong>Your Action Plan:</strong></p><ol><li><strong>Prioritize:</strong> Patch workstations and servers for the Agere Modem and WinSqlite zero-days immediately.</li><li><strong>Test:</strong> Validate the LSASS patches in a staging environment, as authentication fixes can sometimes cause friction with legacy apps.</li><li><strong>Deploy:</strong> Roll out Office updates to protect users from malicious file attachments.</li></ol><p><strong>Official Microsoft Documentation</strong></p><ul><li><strong>Security Update Guide (Searchable Database): </strong><code><a href="https://msrc.microsoft.com/update-guide/?ref=carlscloud.com">https://msrc.microsoft.com/update-guide/</a></code></li><li><strong>KB5073724 (Windows 10 Extended Security Update </strong><code><a href="https://support.microsoft.com/help/5073724?ref=carlscloud.com">https://support.microsoft.com/help/5073724</a></code></li><li><strong>KB5074109 (Windows 11 Cumulative Update): </strong><code><a href="https://support.microsoft.com/help/5074109?ref=carlscloud.com">https://support.microsoft.com/help/5074109</a></code></li><li><strong>Windows Message Center (Release Health): </strong><code><a href="https://learn.microsoft.com/en-us/windows/release-health/windows-message-center?ref=carlscloud.com">https://learn.microsoft.com/en-us/windows/release-health/windows-message-center</a></code></li></ul><p><strong>Stay vigilant and happy patching!</strong></p>]]></content:encoded></item><item><title><![CDATA[Identity is the New Perimeter (and AI is Breaking It)]]></title><description><![CDATA[The consensus for 2026 is clear: Identity is the battlefield, but the rules of engagement have changed.]]></description><link>https://carlscloud.com/identity-is-the-new-perimeter-and-ai-is-breaking-it/</link><guid isPermaLink="false">695d1bd796146e0001cf7b51</guid><category><![CDATA[AI]]></category><category><![CDATA[AI Tools]]></category><category><![CDATA[AI Security]]></category><category><![CDATA[Hacker News]]></category><category><![CDATA[Cybersecurity News]]></category><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Tue, 06 Jan 2026 14:48:37 GMT</pubDate><media:content url="https://ghost5.storage.googleapis.com/2026/01/ai-identity2.png" medium="image"/><content:encoded><![CDATA[<img src="https://ghost5.storage.googleapis.com/2026/01/ai-identity2.png" alt="Identity is the New Perimeter (and AI is Breaking It)"><p>If you&#x2019;ve been following the industry chatter today, you know the narrative has shifted. For years, we (especially those of us with a CISSP/CCSP background) have treated Identity as the &quot;new perimeter.&quot; But a new report from <em><a href="https://www.scworld.com/feature/identity-becomes-the-2026-battleground-as-ai-erases-trust-signals?ref=carlscloud.com">SC Media</a></em> suggests that even this perimeter is dissolving.</p><p>The consensus for 2026 is clear: <strong>Identity is the battlefield</strong>, but the rules of engagement have changed. Attackers are no longer just breaking into networks; they are logging in. And they are using AI to do it with a level of sophistication that erases the &quot;trust signals&quot; we&#x2019;ve relied on for decades.</p><p>Here is my breakdown of the key takeaways from the <em>SC Media</em> feature and what it means for cloud security professionals.</p><h3 id="the-trust-signal-is-dead">The &quot;Trust Signal&quot; is Dead</h3><p>We used to tell users to &quot;look for the typo.&quot; We trained them to spot awkward phrasing or slight mismatches in email domains. That advice is now obsolete.</p><p>With the maturity of AI-driven phishing and deepfakes, the &quot;human&quot; tells are gone. AI agents can now generate perfectly grammatical, context-aware lures that are indistinguishable from legitimate communications.</p><ul><li><strong>The Threat:</strong> Real-time impersonation. It&#x2019;s not just a fake email anymore; it&#x2019;s a deepfake video call from your &quot;CEO&quot; or a realistic voice clone authorizing a wire transfer.</li><li><strong>The Reality:</strong> If your defense strategy relies on users &quot;spotting&quot; the phish, you have already lost.</li></ul><h3 id="the-explosion-of-non-human-identities-nhis">The Explosion of Non-Human Identities (NHIs)</h3><p>As cloud architects, we know that for every human user, there are dozens of service accounts, API keys, and bots. In 2026, this &quot;non-human&quot; population is exploding due to <strong>Agentic AI</strong>.</p><ul><li><strong>The Problem:</strong> AI agents (like those connected via MCP) need permissions to act. They need to read files, access databases, and trigger workflows.</li><li><strong>The Risk:</strong> These agents effectively become high-speed, autonomous users. When they are compromised (or &quot;hallucinate&quot; into unauthorized actions), they don&apos;t just leak data&#x2014;they execute actions at machine speed.</li></ul><h3 id="the-mcp-trap">The &quot;MCP&quot; Trap</h3><p>The article highlights a critical technical gap regarding the <strong>Model Context Protocol (MCP)</strong>. While MCP is fantastic for interoperability (making it the &quot;USB-C of AI&quot;), it was <em>not</em> built with security as a primary primitive.</p><ul><li><strong>Nancy Wang (1Password) puts it bluntly:</strong> &quot;MCP is not a security standard. It was designed for interoperability... Once an agent connects, it&apos;s effectively operating with the same access as the user who configured it.&quot;</li><li><strong>CarlsCloud Take:</strong> This is the new &quot;Over-Privileged Service Account.&quot; If you are deploying MCP-connected agents in your enterprise, you are effectively creating a new attack surface that bypasses traditional IAM governance.</li></ul><h3 id="what-we-need-to-do-the-fix">What We Need to Do (The Fix)</h3><p>The &quot;Castle-and-Moat&quot; is gone. We need to move to an <strong>Identity-First</strong> posture that assumes the user might be an AI imposter.</p><ol><li><strong>Kill the Password:</strong> It is time to aggressively adopt <strong>Passkeys</strong> and FIDO2. Phishing-resistant auth is no longer &quot;nice to have&quot;; it is the baseline.</li><li><strong>Verify Behavior, Not Just Creds:</strong> Since valid credentials can be stolen or simulated, we need &quot;invisible authentication&quot;&#x2014;systems that continuously verify <em>who</em> is behind the keyboard based on behavioral biometrics and context, not just the initial login.</li><li><strong>Secure the Non-Humans:</strong> Treat AI agents like privileged users. Apply strict Least Privilege (PoLP) and short-lived tokens to any MCP connection.</li></ol><h3 id="%F0%9F%94%97-further-reading">&#x1F517; Further Reading</h3><p>To dig deeper into these concepts, check out these sources:</p><ul><li><a href="https://www.scworld.com/feature/identity-becomes-the-2026-battleground-as-ai-erases-trust-signals?ref=carlscloud.com" rel="noopener"><strong>Identity Becomes the 2026 Battleground</strong> (SC Media)</a> - The original feature article analyzing the 2026 identity crisis.</li><li><a href="https://csrc.nist.gov/pubs/sp/800/63/4/final?ref=carlscloud.com" rel="noopener"><strong>NIST SP 800-63-4 Digital Identity Guidelines</strong> (NIST)</a> - The authoritative standard on identity proofing and federation, recently updated to address modern threats.</li><li><a href="https://techcommunity.microsoft.com/blog/microsoftdefendercloudblog/plug-play-and-prey-the-security-risks-of-the-model-context-protocol/4410829?ref=carlscloud.com" rel="noopener"><strong>Plug, Play, and Prey: Security Risks of MCP</strong> (Microsoft)</a> - A technical deep dive into how attackers exploit the Model Context Protocol.</li></ul><p><strong>Securing MCP Servers: What You Need to Know - AI Explainer Series</strong></p><figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/KYWr454hGF0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen title="Securing the MCP Server: What You Need to Know - AI Explainer Series EP 21"></iframe></figure>]]></content:encoded></item><item><title><![CDATA[Security Advisory: React & Next.js RCE (CVE-2025-55182)]]></title><description><![CDATA[Affected Software & Versions
The following React versions are vulnerable:
19.0
19.1.0
19.1.1
19.2.0]]></description><link>https://carlscloud.com/security-advisory-react-next-js-rce-cve-2025-55182/</link><guid isPermaLink="false">69322e88211f590001d7d2a8</guid><category><![CDATA[Attack Vectors]]></category><category><![CDATA[Cybersecurity News]]></category><category><![CDATA[Malware]]></category><category><![CDATA[React]]></category><category><![CDATA[Next.js]]></category><category><![CDATA[Asset Security]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Fri, 05 Dec 2025 01:07:14 GMT</pubDate><media:content url="https://ghost5.storage.googleapis.com/2025/12/social-2.png" medium="image"/><content:encoded><![CDATA[<h3 id="well-this-is-not-great-time-to-patch-devsecops-peeps">Well this is.. not great... &#xA0;Time to patch DevSecOps peeps!!!</h3><img src="https://ghost5.storage.googleapis.com/2025/12/social-2.png" alt="Security Advisory: React &amp; Next.js RCE (CVE-2025-55182)"><p>A maximum-severity vulnerability has been disclosed in the React Server Components. This flaw allows an unauthenticated attacker to achieve Remote Code Execution (RCE) via malicious HTTP requests targeting Server Function endpoints. The issue stems from improper deserialization of payloads.</p><blockquote>&quot;An unauthenticated attacker could craft a malicious HTTP request to any Server Function endpoint that, when deserialized by React, achieves remote code execution on the server,&quot; the security alert warned. &quot;Further details of the vulnerability will be provided after the rollout of the fix is complete.&quot;</blockquote><h2 id="vulnerability-data">Vulnerability Data</h2><ul><li><a href="https://www.cve.org/CVERecord?id=CVE-2025-55182&amp;ref=carlscloud.com"><strong>Primary CVE:</strong> CVE-2025-55182 (React)</a></li><li><a href="https://github.com/vercel/next.js/security/advisories/GHSA-9qr9-h5gf-34mp?ref=carlscloud.com"><strong>Secondary CVE:</strong> CVE-2025-66478 (Next.js)</a></li><li><strong>Severity:</strong> Critical (CVSS 10.0)</li><li><strong>Status:</strong> Patched / Exploitation Imminent</li></ul><h2 id="affected-software-versions">Affected Software &amp; Versions</h2><p>The following React versions are vulnerable:</p><ul><li><strong>19.0</strong></li><li><strong>19.1.0</strong></li><li><strong>19.1.1</strong></li><li><strong>19.2.0</strong></li></ul><p>The bug affects versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of:</p><ul><li><a href="https://www.npmjs.com/package/react-server-dom-webpack?ref=carlscloud.com" rel="nofollow">react-server-dom-webpack</a></li><li><a href="https://www.npmjs.com/package/react-server-dom-parcel?ref=carlscloud.com" rel="nofollow">react-server-dom-parcel</a></li><li><a href="https://www.npmjs.com/package/react-server-dom-turbopack?activeTab=readme&amp;ref=carlscloud.com" rel="nofollow">React-server-dom-turbopack</a></li></ul><blockquote><em>Note: This also impacts default configurations of Next.js, React Router, Waku, and others.</em></blockquote><h2 id="resolution">Resolution</h2><p>Development teams must upgrade <code>react-server-dom-webpack</code>, <code>react-server-dom-parcel</code>, or <code>react-server-dom-turbopack</code> to the following safe versions immediately:</p><ul><li><strong>19.0.1</strong></li><li><strong>19.1.2</strong></li><li><strong>19.2.1</strong></li></ul><h2 id="threat-intelligence">Threat Intelligence</h2><p>While no active in-the-wild exploitation was confirmed at the time of disclosure, security firms (Wiz, WatchTowr, Rapid7) indicate that the barrier to entry for attackers is low. The exploit is high-fidelity, and automated scanning for vulnerable instances is expected to begin shortly.</p>]]></content:encoded></item><item><title><![CDATA[F5 Hacked by Nation-State Actor; BIG-IP Source Code and Vulnerability Data Stolen]]></title><description><![CDATA[According to a Bloomberg report, the intrusion lasted for at least a year and has been attributed to UNC5221, a cyber espionage group with ties to China. The attackers reportedly used a malware family known as BRICKSTORM to maintain persistent access.]]></description><link>https://carlscloud.com/f5-hacked-by-nation-state-actor-big-ip-source-code-and-vulnerability-data-stolen/</link><guid isPermaLink="false">68f0e628b298c40001130285</guid><category><![CDATA[Cybersecurity News]]></category><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Vulnerabilities]]></category><category><![CDATA[Zero Trust]]></category><category><![CDATA[Risk Management]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Thu, 16 Oct 2025 12:41:54 GMT</pubDate><content:encoded><![CDATA[<p>U.S. cybersecurity giant <strong>F5 has suffered a significant security breach</strong>, disclosing that a sophisticated nation-state threat actor infiltrated its corporate network. The attackers made off with a trove of sensitive data, including portions of the source code for F5&apos;s flagship BIG-IP product and, more critically, information about unpatched security vulnerabilities.</p><p>According to a Bloomberg report, the intrusion lasted for at least a year and has been attributed to <strong>UNC5221</strong>, a cyber espionage group with ties to China. The attackers reportedly used a malware family known as <strong>BRICKSTORM</strong> to maintain persistent access.</p><p>F5 discovered the breach on August 9, 2025, but delayed its public announcement at the request of the U.S. Department of Justice (DoJ) to support an ongoing investigation.</p><h3 id="company-response-and-customer-impact">Company Response and Customer Impact</h3><p>F5 has initiated a full-scale incident response, bringing in cybersecurity firms <strong>Mandiant and CrowdStrike</strong> to assist with containment and investigation. The company has taken extensive remedial actions, including:</p><ul><li>Rotating all credentials, signing certificates, and keys.</li><li>Strengthening access controls and deploying advanced threat monitoring tools.</li><li>Implementing additional security layers within its product development environment.</li></ul><p>F5 stated the attack did not compromise its CRM, financial, or customer support systems. However, it acknowledged that files stolen from a knowledge management platform contained configuration or implementation details for a <strong>&quot;small percentage of customers.&quot;</strong> The company is currently reviewing the exfiltrated data and will notify impacted customers directly.</p><p>For protection, all users are strongly advised to immediately apply the latest security updates for BIG-IP, F5OS, and related F5 products.</p><h3 id="cisa-issues-emergency-directive"><strong>CISA Issues Emergency Directive</strong></h3><p>The severity of the breach prompted the U.S. Cybersecurity and Infrastructure Security Agency (<strong>CISA</strong>) to issue <a href="https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices?ref=carlscloud.com"><strong>Emergency Directive 26-01</strong>.</a> The directive mandates that all Federal Civilian Executive Branch agencies take immediate action to mitigate the &quot;imminent threat.&quot;</p><p>CISA warned that with the stolen source code and vulnerability data, the &quot;nation-state affiliated cyber threat actor has a technical advantage to exploit F5 devices and software.&quot; This access could allow the attackers to discover new zero-day flaws and develop targeted exploits before patches are available.</p><h3 id="federal-agencies-are-required-to">Federal agencies are required to:</h3><p></p><blockquote>Inventory all F5 BIG-IP products on their networks.</blockquote><blockquote>Ensure no networked management interfaces are accessible from the public internet.</blockquote><blockquote>Apply the newly released F5 security patches by <strong>October 22, 2025</strong>.</blockquote><blockquote>Submit a full report to CISA by <strong>October 29, 2025</strong>.</blockquote><p>Michael Sikorski, CTO at Palo Alto Networks&apos; Unit 42, emphasized the danger. &quot;In this case, they also stole information on undisclosed vulnerabilities that F5 was actively working to patch,&quot; he said. &quot;This provides the ability for threat actors to exploit vulnerabilities that have no public patch, potentially increasing speed to exploit creation.&quot;</p><h3 id="additional-resources">Additional Resources:</h3><p><a href="https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices?ref=carlscloud.com">CISA Emergency Directives</a></p><p><a href="https://my.f5.com/manage/s/tech-documents?ref=carlscloud.com">F5 Security Advisories</a></p>]]></content:encoded></item><item><title><![CDATA[2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce]]></title><description><![CDATA[Hiring an external candidate can be a significant expense, with the average cost per hire in the U.S. at nearly $5,000, so the importance and value of retention during a period of economic pressure increases.]]></description><link>https://carlscloud.com/2025-cybersecurity-hiring-trends-why-investing-in-entry-and-junior-level-talent-is-key-to-building-a-more-resilient-cybersecurity-workforce/</link><guid isPermaLink="false">687f97691fef2b0001effd74</guid><category><![CDATA[ISC2]]></category><category><![CDATA[CISSP]]></category><category><![CDATA[CCSP]]></category><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Cybersecurity News]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Tue, 22 Jul 2025 14:14:42 GMT</pubDate><media:content url="https://ghost5.storage.googleapis.com/2025/07/2025-ISC2-Cyber-Hiring-Trends.png" medium="image"/><content:encoded><![CDATA[<h2 id="isc2-article-link"><a href="https://www.isc2.org/insights/2025/06/cybersecurity-hiring-trends-study?ref=carlscloud.com">ISC2 Article Link</a></h2><h3 id="authordan-houser-issap-issmp-cissp-ccsp-csslp-cc">Author - Dan Houser, ISSAP, ISSMP, CISSP, CCSP, CSSLP, CC</h3><img src="https://ghost5.storage.googleapis.com/2025/07/2025-ISC2-Cyber-Hiring-Trends.png" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce"><p>Colleagues and friends,</p><p>I continue to be proud of the work ISC2 delivers as a global voice on behalf of its members, and this 2025 ISC2 Cybersecurity Hiring Trends Report spotlights how vital cybersecurity certifications continue to be. I am also immensely thankful for the opportunity to provide a few thoughts regarding this important work.</p><p>I&#x2019;m encouraged that three quarters of respondents are investing in their employees via training, vital to keeping pace with emerging challenges.&#x202F;I am also heartened at the strong showing for apprenticeships and internships as a path for security talent, which I have personally found rewarding and effective. Further, the report highlights the importance of broadening hiring outside traditional STEM/CompSci backgrounds and leveraging psychology, communications, business and internal roles outside IT. Some of my best hires and managers came from retail, restaurants and construction management, highlighting (as this report shows) the increasing relevance of soft skills to effective cybersecurity candidates.</p><p>We also have some work to do, based on these results, to continue to educate the marketplace and create realistic and balanced job descriptions. <a href="https://www.isc2.org/certifications/cc?ref=carlscloud.com" rel="noopener noreferrer">Certified in Cybersecurity (CC)</a> has a strong presence in the marketplace in only its third year. However, over a third of hiring managers wanted to see advanced certifications (<a href="https://www.isc2.org/certifications/cissp?ref=carlscloud.com" rel="noopener noreferrer">CISSP</a>, CISA, CISM) and unlikely or unfeasible skills in entry and junior-level hires. This has been a problem for some time and it seems the battle continues.</p><p>My organization had a downsizing, one of many consulting firms that were challenged over the past few quarters. I found my role made redundant just before the 2024 holidays along with several others in my firm, enduring a typical unemployment period seeking my next great adventure. Reporting from the front lines, the hiring environment has dramatically changed and not for the better. In talking with recruiters in many key cybersecurity economies, staffing is becoming increasingly challenging as recruiters are slammed with AI-polished resumes delivered via automation, many times seeing more than 1,000 applications in the first day of a job posting. With so much noise, how do we ensure true professionals are finding roles?&#x202F;The answer is the same that caused ISC2 to be founded 35 years ago - certification.</p><p>As this report shows, certification continues to deliver differentiation in the marketplace, outpacing education and nearly on par with experience. Certification has never been more crucial to ensure there is clear qualification of cybersecurity professionals, enabling those holding <a href="https://www.isc2.org/certifications/ccsp?ref=carlscloud.com" rel="noopener noreferrer">CCSP</a>, <a href="https://www.isc2.org/certifications/cissp?ref=carlscloud.com" rel="noopener noreferrer">CISSP</a>, <a href="https://www.isc2.org/certifications/issap?ref=carlscloud.com" rel="noopener noreferrer">ISSAP</a>, <a href="https://www.isc2.org/certifications/csslp?ref=carlscloud.com" rel="noopener noreferrer">CSSLP</a> and other ISC2 credentials to stand out in a crowded and increasingly automated field. Never has certification accreditation, such as ANSI ISO/IEC 17024, been so important to cybersecurity, to ensure that those credentials matter and can be relied on by hiring managers and recruiters as independent verification of competency to a benchmark standard.</p><p>I encourage you to read this report and see how your opinions and practices may change. I found some surprises that I know will change my hiring perspectives going forward. The future is bright, even if the path continues to not be easy, as our profession continues to grow and learn in unexpected ways. I hope to see you at the <a href="https://web.cvent.com/event/00885cdc-a7ef-4682-81d1-77950c2f3d07/websitePage:e3e1427f-5c48-423a-a0e5-60dcec1c4363?RefId=Attend&amp;utm_campaign=GBL-SecurityCongress&amp;utm_content=congress&amp;utm_medium=bannereventslide&amp;utm_source=isc2web&amp;utm_term=eventslider" rel="noopener noreferrer">2025 ISC2 Security Congress</a> for one of those great ways we can grow together!</p><p>Warmest Regards,</p><p>Dan Houser, ISSAP, ISSMP, CISSP, CCSP, CSSLP, CC</p><blockquote><strong>2025 Cybersecurity Hiring Trends:</strong></blockquote><blockquote><em><strong>Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce</strong></em></blockquote><blockquote>As a profession, cybersecurity has enjoyed a long period of high personnel demand in the face of restricted supply. However, <a href="https://www.isc2.org/Insights/2024/10/ISC2-2024-Cybersecurity-Workforce-Study?ref=carlscloud.com" rel="noopener noreferrer">ISC2 research has shown</a> that the economic and geopolitical factors that have weighed on other parts of organizations in recent years are now impacting cybersecurity teams and departments to the same degree. Cybersecurity professionals and hiring managers charged with recruiting and retaining staff for these critical roles are now dealing with unprecedented budgetary pressures that make building and retaining resilient teams even more challenging.</blockquote><blockquote>Nonetheless, cybersecurity remains an essential, in-demand and well-rewarded career path, offering both vast opportunities and complex challenges for hiring managers who are competing for top talent from a limited pool of candidates. The current climate has also put entry- and junior-level personnel and candidates in the spotlight, with the need to maintain and progress cybersecurity professionals through cybersecurity teams remaining a key consideration for hiring managers, as well as ensuring that job descriptions for early-career roles are realistic and achievable.</blockquote><blockquote>Success also relies on investing in and retaining the right people at every level as well as every part of the organization. To understand how cybersecurity hiring managers are finding success investing in entry- and junior-level roles, ISC2 surveyed 929 hiring managers across organizations of all sizes in <strong>Canada</strong>, <strong>Germany</strong>, <strong>India</strong>, <strong>Japan</strong>, <strong>the U.K.</strong> and <strong>the U.S.</strong>&#x2014; six countries identified as having established or growing cybersecurity staffing needs. All respondents had entry- and junior-level cybersecurity personnel on staff and recruited for such roles in the two years prior to the survey taking place.</blockquote><p><strong>Key Findings</strong></p><p>The following key findings highlight the main opportunities and challenges hiring managers face when building entry- and junior-level cybersecurity teams:</p><ol><li>When it comes to hiring entry- and junior-level cybersecurity professionals, <strong>security managers prioritize hands-on experience and certifications over relevant education.</strong> In fact, most would consider candidates with only previous IT work experience (90%), or those who only hold an entry-level cybersecurity certification (89%), over those with only education in IT, cybersecurity or computer science, suggesting that relevant experience and certifications can often outweigh a degree alone when competing for cybersecurity roles.</li><li><strong>Internships (55%) and apprenticeships (46%) are considered powerful tools for identifying and recruiting early-career cybersecurity talent.</strong> While standard job postings and staffing/recruiting firms remain top sources for identifying or recruiting entry- and junior-level hires (tied at 57%), sectors such as education, healthcare, government, IT services, and telecommunications are turning to internships just as often&#x2014;or even more. This shift is especially pronounced in India, the U.K. and the U.S. Meanwhile, hiring managers in energy and utilities are increasingly relying on apprenticeships to fill critical roles.</li><li><strong>While nearly 3 in 5 cybersecurity hiring managers (58%) said they are concerned about attrition among entry- and junior-level team members,</strong> <strong>most said they have both the budget to invest in their professional development (75%) and to adequately staff their team (73%). </strong>The research affirmed that training entry- and junior-level talent is not only fast but also cost-effective, making it a strategic investment with a high potential return.</li><li><strong>About a quarter of cybersecurity hiring managers that recruit from education programs (55% of participants) have identified entry- and junior-level cybersecurity talent from programs outside of computer science, IT, or cybersecurity, </strong>highlighting an opportunity to broaden the talent pool by considering candidates from both IT and non-IT academic backgrounds who may bring fresh perspectives to the field.</li><li><strong>Indicators point to cybersecurity hiring managers valuing non-technical skills as much as, or in some cases, more than, technical skills.</strong> The ability to work in a team, problem-solving and analytical thinking rank highest, ahead of data security and cloud security. This signals that hiring managers are not necessarily prioritizing technical know-how; they are looking for collaborative, adaptable thinkers who can tackle the complex problems impacting the cybersecurity landscape.</li><li><strong>There is a recurring disconnect between the skills and credentials that security managers expect from entry- and junior-level cybersecurity professionals versus what this group can realistically achieve at this stage in their career. </strong>Take cloud security, for example&#x2014;the top technical concept that security managers said entry- and junior-level candidates should be familiar with. Despite viewing it as an important concept to understand, only 18% of managers believe cloud security tasks could be handled by an entry-level professional, while 46% said junior-level expertise was required.</li></ol><p>Despite the positive hiring plans stated by respondents at the time this study was conducted in December 2024 (75% of hiring managers had planned to hire more cybersecurity professionals during 2025, while nearly 90% had open positions at their organization), the cybersecurity profession (like many others right now) is still experiencing economic pressure that has arguably increased in recent months.</p><p>What&#x2019;s more, simply hiring more employees is not a guaranteed fix for skills shortages within cybersecurity teams. Organizations should consider a more holistic approach&#x2014;examining not just their recruitment and hiring strategies, but also what drives employee retention. Hiring an external candidate can be a significant expense, with the average cost per hire in the U.S. at nearly <a href="https://www.shrm.org/content/dam/en/shrm/research/benchmarking/Talent%20Access%20Report-TOTAL.pdf?ref=carlscloud.com">$5,000</a>, so the importance and value of retention during a period of economic pressure increases.</p><p>By analyzing the stages of the employee lifecycle and developing or even reframing recruitment and retention strategies, organizations can uncover staffing opportunities and focus their efforts on securing the best talent.</p><p>One key consideration is the role of entry- and junior-level talent in filling cybersecurity vacancies. As seen in ISC2&#x2019;s previous hiring manager and cybersecurity professional <a href="https://edge.sitecorecloud.io/internationf173-xmc4e73-prodbc0f-9660/media/Project/ISC2/Main/Media/documents/research/ISC2-Cybersecurity-Hiring-Managers-Guide.pdf?ref=carlscloud.com">research</a>, respondents indicated that many security managers (and perhaps organizations) are still setting unrealistic expectations and using unachievable job descriptions for early-career cybersecurity professionals. This is occurring even though many of the most pressing skills gaps can be filled by this group with the right training, support and realistic role parameters.</p><p>Hiring managers can effectively target this critical group, whether by refining job descriptions, providing clear development trajectories, or offering structured training and mentorships. Hiring strategies that include sourcing candidates from alternative pathways&#x2014;such as internships, apprenticeships, and non-traditional educational or training backgrounds &#x2014;can also help strengthen talent pipelines and foster a new generation of cybersecurity professionals from which hiring managers can draw. It is more important than ever for organizations to have these tools in place to stay ahead in a profession that demands continuous learning and adaptation.</p><blockquote><em>&quot;<strong>[Entry- and junior-level cybersecurity professionals] are an indispensable presence for our company as they are the people who will be in charge of the company in the future.</strong>&quot;</em></blockquote><p>Cybersecurity hiring manager based in Japan</p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide1.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>Echoing the findings from the 2022 <a href="https://edge.sitecorecloud.io/internationf173-xmc4e73-prodbc0f-9660/media/Project/ISC2/Main/Media/documents/research/ISC2-Cybersecurity-Hiring-Managers-Guide.pdf?ref=carlscloud.com" rel="noopener noreferrer">ISC2 Cybersecurity Hiring Managers Guide,</a> staffing/recruitment organizations and standard job postings remain the top sources for identifying or recruiting entry- and junior-level cybersecurity candidates. However, this year&#x2019;s findings highlight the importance of internship and apprenticeship programs in sourcing early-career cybersecurity talent, which ranked among the top five sources. In certain industries and countries, internships and apprenticeships are used just as much, if not more, to source early-career cybersecurity talent. For instance, industries such as education, healthcare, government, IT services and telecommunications are using internships more frequently than other industries to identify candidates. Regionally, this trend is also evident in India, the U.K. and the U.S. Meanwhile, in sectors like energy and utilities, cybersecurity hiring managers are increasingly relying on apprenticeships to fill critical roles.</p><!--kg-card-begin: html--><table align="right" style="box-sizing: border-box; border-width: 0px; border-style: solid; border-color: inherit; border-image: initial; --tw-border-spacing-x: 0px; --tw-border-spacing-y: 0px; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; text-indent: 0px; border-collapse: separate; border-spacing: 0px; padding-bottom: 1rem; color: rgb(0, 0, 0); font-family: __Open_Sans_796790, __Open_Sans_Fallback_796790; font-size: medium; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><tbody style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;"><tr style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;"><td style="box-sizing: border-box; border: 1px solid rgb(230, 234, 236); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; --tw-border-opacity: 1; text-align: right; padding: 0.75rem 1rem; --tw-bg-opacity: 1; --tw-text-opacity: 1; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); border-bottom-left-radius: 1rem; border-bottom-right-radius: 1rem;"><em style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;"><strong style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; font-weight: bolder;">Internships and apprenticeships often serve similar purposes but differ in structure. Typically, internships are shorter term placements (often during or after university) that offer exposure to office-based work but may not guarantee a job at the end. Apprenticeships, on the other hand, are usually longer term and combine on-the-job training with formal instruction and usually lead to a job upon successful completion. In some countries, like the U.K. and Japan, apprenticeships have traditionally been associated with trades, but they seem to be gaining more traction in professional fields like cybersecurity. However, internships are still used more widely than apprenticeships as pathways for entry- and junior-level talent into the field.</strong></em></td></tr></tbody></table><!--kg-card-end: html--><p>The fourth most cited method for identifying cybersecurity talent is through colleges and universities. Among cybersecurity hiring managers who recruit from this source, the majority find entry- and junior-level candidates from relevant undergraduate (80%), graduate (80%) and associate (72%) programs&#x2014;with degrees in IT, computer science or cybersecurity.</p><p>However, a clear trend has emerged: Some cybersecurity hiring managers are looking beyond traditional academic and professional backgrounds when needing to fill entry- and junior-level cybersecurity roles. Nearly a quarter of those who recruit from colleges and universities said they had identified candidates from courses and backgrounds not directly related to cybersecurity or computer science (27% from undergraduate degree programs, 20% from graduate programs). This trend was mirrored inside organizations as well. Among the 22% of hiring managers who sourced cybersecurity talent from other departments within their organizations, most recruited from IT (85%) and technical support/help desk (68%). However, they also found candidates from their finance (39%), HR (38%), communications (37%), customer service (35%) and marketing (31%) teams.</p><p>This trend indicates the value that professionals from non-IT backgrounds can bring to the field, offering fresh perspectives, business acumen, technical and non-technical (soft) skills, and innovative thinking to the cybersecurity team.</p><h2 id="developing-the-hiring-process">Developing the Hiring Process</h2><p>Several important steps in the hiring process help organizations attract top cybersecurity talent, including writing job descriptions, screening applications and assessing potential candidates. But who oversees these processes and why does it matter?</p><p><strong>Job Descriptions</strong></p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/2025-Cyber-Hiring-Trends_who-sets-job-reqs.jpg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>A job description is often a candidate&#x2019;s first impression of an organization. It&#x2019;s more than just a list of requirements; it also serves as a reflection of the company and should accurately depict what the role entails, as well as be realistically targeted. A job description requiring an experience-heavy candidate for an entry-level role would be an unrealistic outcome, prolonging the hiring process and significantly reducing the chances of a successful hire. Our findings reveal that IT and cybersecurity hiring managers typically take the lead in defining most requirements, such as technical skills, educational background, certifications, professional experience, security clearances and keywords for applicant tracking systems. The one exception? Non-technical skills and personality attributes, which are more often shaped by HR.</p><!--kg-card-begin: html--><table align="right" style="box-sizing: border-box; border-width: 0px; border-style: solid; border-color: inherit; border-image: initial; --tw-border-spacing-x: 0px; --tw-border-spacing-y: 0px; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; text-indent: 0px; border-collapse: separate; border-spacing: 0px; padding-bottom: 1rem; color: rgb(0, 0, 0); font-family: __Open_Sans_796790, __Open_Sans_Fallback_796790; font-size: medium; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><tbody style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;"><tr style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;"><td style="box-sizing: border-box; border: 1px solid rgb(230, 234, 236); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; --tw-border-opacity: 1; text-align: right; padding: 0.75rem 1rem; --tw-bg-opacity: 1; --tw-text-opacity: 1; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); border-bottom-left-radius: 1rem; border-bottom-right-radius: 1rem;"><strong style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; font-weight: bolder;"><em style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;"><span style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; letter-spacing: -0.16px; color: rgb(0, 0, 0);">Hiring managers in the U.K. and India (both 74%) are significantly more likely to say that HR determines non-technical skills and personality attributes compared to managers in the U.S. (60%), Germany (53%), Canada (51%) and Japan (45%)</span>&#xA0;</em></strong></td></tr></tbody></table><!--kg-card-end: html--><p><strong>Screening Applications</strong></p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide3.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>For entry- and junior-level positions, application screening is most commonly a shared responsibility between IT/cybersecurity hiring managers and HR (53%). In other cases, it is handled exclusively by IT/cybersecurity hiring managers (35%) or solely by HR and software tools (13%).</p><p>This division of responsibility indicated by respondents mirrors the process of writing job descriptions, ensuring that both technical and non-technical qualifications are carefully considered during the screening stage.</p><p><strong>Advice for Job Seekers</strong></p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide4.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><ul><li><strong>Be prepared to demonstrate your knowledge in action, not just on paper.</strong> According to the study respondents, most organizations (84%) use skills-based assessments and/or tests for entry- and junior-level cybersecurity applicants.</li><li><strong>Your online presence matters more than you might think.</strong> Over half of hiring managers (54%) say they have passed on candidates due to their social media activity.</li></ul><h2 id="the-role-of-certifications">The Role of Certifications</h2><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide5.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>When recruiting entry- and junior-level cybersecurity professionals, hiring managers prioritize hands-on experience and certifications over relevant education. In fact, most respondents (90%) stated they would consider candidates with only previous IT work experience, or those who only hold an entry-level cybersecurity certification (89%), suggesting that relevant experience and certifications that validate foundational competence carry additional weight in the hiring decision-making process, potentially outweighing a degree alone when competing for cybersecurity roles.</p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide6.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>Additionally, when assessing the importance of previous IT experience, IT/cybersecurity certifications and relevant education, nearly all security managers considered these attributes as either critical or nice to have. However, when prioritizing only the critical attributes, IT/cybersecurity certifications (47%) ranked slightly higher than IT experience (44%) and relevant education (43%).</p><p>So, which certifications hold the most weight? While most cybersecurity certifications are seen as &quot;nice to have&quot; rather than required, there are key exceptions. For entry- and junior-level professionals, three foundational certifications lead the professional certification requirement from hiring managers across both groups of early-career professionals: <a href="https://www.isc2.org/certifications/cc?ref=carlscloud.com" rel="noopener noreferrer">Certified in Cybersecurity (CC)</a> introduced by ISC2 in late 2022, along with CASP+ and Security+ from CompTIA.</p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide7.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>A closer look at the top certifications required for entry- and junior&#x2013;level positions revealed a notable misalignment between employer expectations and feasibility. A point aligned with the need for realistic job description requirements, the findings revealed that a significant proportion of hiring managers are still specifying industry qualifications that are unfeasible for these roles.</p><p>Many of the top certifications required for professionals seeking entry- and junior-level positions are intended to support more experienced cybersecurity professionals. For example, 38% of hiring managers said they require the CISA (ISACA) certification for entry-level positions, even though this certification demands a minimum of five years of professional experience in information systems auditing, control, assurance or security. Likewise, hiring managers expect around a third of entry- (34%) and junior-level (33%) candidates to have the <a href="https://www.isc2.org/certifications/cissp?ref=carlscloud.com" rel="noopener noreferrer">CISSP</a> (ISC2) certification, which also requires a minimum of five years of cumulative, paid experience in cybersecurity.</p><blockquote><em>&quot;<strong>This gap in what security managers require from early-career talent versus what these groups can realistically achieve creates a significant barrier to entry, which could potentially discourage otherwise qualified and capable candidates from applying for foundational cybersecurity roles.</strong>&quot;</em></blockquote><h2 id="top-sought-after-skills-for-entryand-junior-level-roles">Top Sought-After Skills for Entry- and Junior-Level Roles</h2><p>Indicators point to cybersecurity hiring managers valuing non-technical skills as much as, or in some cases, more than, technical skills. In fact, three of the top five skills that hiring managers indicate they value most &#x2013; teamwork, problem-solving and analytical thinking &#x2013; aren&#x2019;t technical at all.</p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide8.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>With these three attributes ranking ahead of data security and cloud security skills, we see a clear requirement for a blend of both technical and non-technical fundamental competencies. This signals that hiring managers are looking for collaborative, adaptable thinkers who can tackle complex problems in the cybersecurity landscape, rather than just technology specialists.</p><!--kg-card-begin: html--><table align="right" style="box-sizing: border-box; border-width: 0px; border-style: solid; border-color: inherit; border-image: initial; --tw-border-spacing-x: 0px; --tw-border-spacing-y: 0px; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; text-indent: 0px; border-collapse: separate; border-spacing: 0px; padding-bottom: 1rem; color: rgb(0, 0, 0); font-family: __Open_Sans_796790, __Open_Sans_Fallback_796790; font-size: medium; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><tbody style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;"><tr style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;"><td style="box-sizing: border-box; border: 1px solid rgb(230, 234, 236); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; --tw-border-opacity: 1; text-align: right; padding: 0.75rem 1rem; --tw-bg-opacity: 1; --tw-text-opacity: 1; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); border-bottom-left-radius: 1rem; border-bottom-right-radius: 1rem;"><strong style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; font-weight: bolder;"><em style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;">&#xA0;This trend varies slightly by country. For example, hiring managers in India stand out as the only group that listed technical skills in their top three rankings&#x2014;without including any soft skills. This compares with the U.K., which was the country that specified an entirely non-technical top three set of skills priorities.</em></strong></td></tr></tbody></table><!--kg-card-end: html--><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide9.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>Here is the breakdown across technical, non-technical and personality attributes:</p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide10.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><h2 id="navigating-skill-expectations-for-entry-level-roles">Navigating Skill Expectations for Entry-Level Roles</h2><p>When asked what they would say to those who believe there are no true entry-level roles in cybersecurity, cybersecurity hiring managers consistently highlighted the value these candidates bring. They pointed to fresh perspectives, the ability to take on foundational tasks like malware analysis and penetration testing and the capacity to relieve senior team members of routine responsibilities.</p><p>Our research also revealed the tasks most likely to be assigned by experience level:</p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide11.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>To truly practice what they preach, organizations should clearly define entry-level roles, perhaps also differentiating between &#x201C;desired qualifications&#x201D; and &#x201C;required qualifications&#x201D; in job descriptions. Early on, they can also communicate professional development opportunities and map career growth for these candidates. This will serve a dual purpose by empowering cybersecurity candidates to apply for roles with more confidence and helping prospective and current employees envision their long-term potential within the company.</p><blockquote><em>&quot;<strong>Cybersecurity is a constantly evolving field, with new threats and technologies emerging all the time. Career starters generally have a greater ability to learn and adapt.</strong>&quot;</em></blockquote><p>Cybersecurity hiring manager based in Germany</p><blockquote><em>&quot;<strong>Entry-level candidates can assist in conducting risk assessments and creating risk profiles, helping to identify and mitigate potential threats before they become serious issues.</strong>&quot;</em></blockquote><p>Cybersecurity hiring manager based in the U.S.</p><blockquote><em>&quot;<strong>There are many roles in cybersecurity for entry-level professionals. As a former CTO and current CEO, I can assure you that the main in-house cybersecurity projects are handled by interns or first-year cybersecurity interns.</strong>&quot;</em></blockquote><p>Cybersecurity hiring manager based in India</p><h2 id="professional-development-and-retention">Professional Development and Retention</h2><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide12.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>Most cybersecurity hiring managers reported having both the budget to invest in entry- and junior-level workers&#x2019; professional development (75%) and to adequately staff their teams (73%) at the time this survey was fielded. Nearly 60% expressed concern about employee attrition. If resources are available, where does this concern stem from? Beyond certain job features like salary/wages and total rewards, the overall employee experience plays a critical role in employee retention, particularly professional development opportunities. A <a href="https://joinhandshake.com/blog/network-trends/handshake-shrm-preparing-the-next-generation/?ref=carlscloud.com" rel="noopener noreferrer">study</a> of early-career professionals found that while about one-third (32%) of recent graduates intend to stay in their current job for four or more years, nearly twice as many&#x2014;almost two-thirds (65%)&#x2014;would stay for the same amount of time given consistent opportunities to develop in-demand skills.</p><blockquote><em>&quot;<strong>Our entry-level and junior cybersecurity team members bring fresh perspective, technical expertise and enthusiasm to our organization, enhancing our overall capabilities. By investing in their growth and development, we&apos;re cultivating future leaders who will help drive our organization&apos;s success.</strong>&quot;</em></blockquote><p>Cybersecurity hiring manager based in the U.K.</p><p>Most organizations, based on participant feedback, are on the right track&#x2014;91% of hiring managers who responded said they provide professional development opportunities for entry- and junior-level cybersecurity professionals during work hours. In some cases, engaging entry- and junior-level talent may be as simple as communicating these opportunities and providing concrete examples of how they can take advantage of them.</p><!--kg-card-begin: html--><table align="right" style="box-sizing: border-box; border-width: 0px; border-style: solid; border-color: inherit; border-image: initial; --tw-border-spacing-x: 0px; --tw-border-spacing-y: 0px; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; text-indent: 0px; border-collapse: separate; border-spacing: 0px; padding-bottom: 1rem; color: rgb(0, 0, 0); font-family: __Open_Sans_796790, __Open_Sans_Fallback_796790; font-size: medium; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><tbody style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;"><tr style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;"><td style="box-sizing: border-box; border: 1px solid rgb(230, 234, 236); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; --tw-border-opacity: 1; text-align: right; padding: 0.75rem 1rem; --tw-bg-opacity: 1; --tw-text-opacity: 1; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); border-bottom-left-radius: 1rem; border-bottom-right-radius: 1rem;"><em style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;"><strong style="box-sizing: border-box; border: 0px solid rgb(229, 231, 235); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(59,130,246,.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ; font-weight: bolder;">When looking across the different countries, hiring managers in Germany (99%) are significantly more likely to offer professional development opportunities for entry- and junior-level professionals than those in the U.S. (93%), India (91%), the U.K. (87%), Canada (89%) and Japan (86%).</strong></em></td></tr></tbody></table><!--kg-card-end: html--><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide13.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>The top professional development offerings that organizations provide to entry- and junior-level cybersecurity professionals include certification training/courses (65%), training/courses for non-certification skills/knowledge (59%), career pathing and advancement (57%) and mentorship programs (informal and formal) (50%). Notably, when hiring managers were asked about the most effective ways to train entry- and junior-level cybersecurity professionals, their responses mostly aligned with these existing offerings.</p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide14.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>Despite mentorships being cited as one of the most effective ways to train early-career talent, half of organizations do not provide this option. The primary reasons for this are that organizations have other methods (37%), there&#x2019;s a lack of staff who can or are willing to be mentors (36%) and a lack of time/security team is too busy (32%).</p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide15.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>Our research reveals that early-career cybersecurity roles are relatively quick to fill. Twenty-one percent of hiring managers say entry-level cybersecurity roles are typically filled in under a month, with another 40% reporting it typically takes just 1&#x2013;3 months. For junior-level roles, 8% say these positions can be filled in less than a month and 34% within 1&#x2013;3 months. These timelines stand in contrast to more senior roles, which often take longer to fill.</p><figure class="kg-card kg-image-card"><img src="https://ghost5.storage.googleapis.com/2025/07/Slide16.jpeg" class="kg-image" alt="2025 Cybersecurity Hiring Trends: Why Investing in Entry- and Junior-Level Talent is Key to Building a More Resilient Cybersecurity Workforce" loading="lazy" width="601" height="338"></figure><p>Once hired, training this group can be fast and cost-effective, too. Most hiring managers reported that training entry- (81%) and junior-level (79%) professionals to handle tasks independently takes less than a year. However, the training timeline varies slightly between these groups. For example, hiring managers are more likely to say that junior-level cybersecurity professionals require less time in the early stages, with 17% stating they can be trained in 1-3 months, compared to 8% for entry-level professionals. The majority of hiring managers surveyed (56%) said that training entry-level cybersecurity professionals typically takes 4&#x2013;9 months, while 45% said the same for junior-level professionals.</p><p>When examining training costs, hiring managers commonly registered spending between U.S. $1,000 and $4,999 to train entry- (45%) and junior-level (38%) cybersecurity professionals to handle tasks independently. However, nearly a third (31%) indicate that training an entry-level professional costs less than $1,000, while a quarter (25%) report the same for junior-level professionals.</p><h2 id="conclusion">Conclusion</h2><p>The findings of this study provide a clear view of the current cybersecurity hiring landscape, highlighting key challenges and opportunities for all hiring managers. Demand for key skills in the cybersecurity profession remains high. While most organizations had open positions and planned to hire more professionals in the year ahead when this survey took place, it&#x2019;s critical to regularly reassess current recruitment, hiring and retention strategies to ensure they are viable and actionable and aligned with the current conditions the organization is operating within.</p><blockquote><em>&quot;<strong>Our juniors are our rising stars. If I had half a dozen more juniors of the caliber we have now, we would not have ANY security concerns going into the 2040s even.</strong>&quot;</em></blockquote><p>Cybersecurity hiring manager based in Canada</p><p>This doesn&#x2019;t mean starting from scratch&#x2014;it means refining current process and thinking outside the box on how to attract top talent. Hiring managers should consider the following:</p><ul><li><strong>Address the disconnect between employer expectations and entry- and junior-level realities. </strong>Our research shows that job descriptions for entry- and junior-level cybersecurity talent list requirements that are often difficult or impossible for these professionals to meet. This can create a catch-22&#x2014;where employers struggle to find qualified candidates and early-career talent is locked out of opportunities that could help them build that very experience. Hiring managers should consider reevaluating their job descriptions and other hiring mechanisms to reflect the true nature of the role, making the distinction between &#x201C;nice-to-have&#x201D; and &#x201C;must-have&#x201D; qualifications clear.</li><li><strong>Embrace alternative pathways into the cybersecurity profession &#x2013; hire for attitude, train for aptitude.</strong> As a relatively new and evolving field, cybersecurity requires a dynamic approach to talent acquisition. Traditional pipelines, such as relevant educational backgrounds and prior IT experience, remain valuable, but they are not the only routes to success in the cybersecurity profession. Hiring cybersecurity professionals from a broad spectrum of educational and professional backgrounds is an effective strategy to address shortages in candidates without compromising on standards. In fact, blending technical expertise with non-technical skills or personality attributes such as teamwork, problem-solving skills, analytical thinking, etc., can strengthen cybersecurity teams and bring fresh perspectives to the field.</li><li><strong>Leverage foundational certifications to identify high-potential talent.</strong> While some experience-based certifications are incompatible with early-career cybersecurity roles, foundational certifications provide an achievable and independent means to verify the competency of an entry- or junior-level candidate. These globally-recognized and reproducible baseline measures of knowledge and capability offer hiring managers a valuable tool to differentiate and evaluate these candidates.</li></ul><p>The research shows that many security managers have already begun tapping into &#x201C;non-traditional&#x201D; talent pools and embracing non-technical, non-IT and foundational certified candidates. However, there is room to expand these efforts further, leveraging transferable skills from other industries to build a more sustainable and resilient cybersecurity workforce.</p><h2 id="about-isc2-methodology">About ISC2 &amp; Methodology</h2><p><strong>Survey Methodology</strong></p><p>We surveyed a total of 929 cybersecurity hiring managers from Canada (158), Germany (155), India (152), Japan (154), the U.K. (155) and the U.S. (155) in December of 2024. Respondents were surveyed in their native or local languages. To be eligible to participate, managers had to have entry- or junior-level cybersecurity professionals on their teams. Most (94%) had hired entry- and junior-level professionals in the past two years. The margin of error for the global descriptive statistics in this research is +/- 3% at a 95% confidence level.</p><h3 id="did-you-enjoy-carlscloud%E2%84%A2-today-and-did-i-help-you-at-all">Did you enjoy CarlsCloud&#x2122; today and did I help you at all?</h3><p>If so, <strong><a href="https://www.buymeacoffee.com/carlscloud?ref=carlscloud.com">buy me a coffee</a></strong> or just shoot me a <a href="https://www.linkedin.com/in/carlballenger/?ref=carlscloud.com"><strong>note via LinkedIn</strong></a> to say thanks it would mean a lot!</p>]]></content:encoded></item><item><title><![CDATA[CarlsCloud™ Study Guide Series: CISSP Mock Exam Deep Dive: Questions 16-20 – Answers & Explanations!]]></title><description><![CDATA[Understanding the concepts that underpin these answers is crucial for mastering the CISSP domains and effectively applying cybersecurity principles in real-world scenarios.   Let's dive in!]]></description><link>https://carlscloud.com/cissp-mock-exam-review-questions-16-20-answers-explanations/</link><guid isPermaLink="false">684c3a5d87ba4e00011a4c6c</guid><category><![CDATA[CarlsCloud™ CISSP Exam Prep]]></category><category><![CDATA[CISSP Exam Resources]]></category><category><![CDATA[CISSP Study Plans]]></category><category><![CDATA[CISSP]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Fri, 13 Jun 2025 15:09:37 GMT</pubDate><content:encoded><![CDATA[<p></p><h3 id="welcome-back-aspiring-cissp-professionals">Welcome back, aspiring CISSP professionals!</h3><p>In our previous posts, we challenged your knowledge with a set of <a href="https://carlscloud.com/carlscloud-study-guide-series-cissp-mock-exam-deep-dive-questions-16-20/">CarlsCloud&#x2122; CISSP mock exam questions 16-20</a> focusing on crucial aspects of cybersecurity. </p><p>Now, it&apos;s time to reveal the answers and delve into the <em><strong>why</strong></em> behind them!</p><p>Understanding the concepts that underpin these answers is crucial for mastering the CISSP domains and effectively applying cybersecurity principles in real-world scenarios. &#xA0; <strong>Let&apos;s dive in!</strong></p><h3 id="question-16">Question 16</h3><p>Carla is conducting an assessment of an organization using the Software Assurance Maturity Model (SAMM). &#xA0;She notes that the organization seems to have difficulty with defect management and will be reporting that finding. </p><p><strong>Which business function of SAMM includes defect management?</strong></p><p><strong>A. Implementation</strong></p><p>B. Governance</p><p>C. Verification</p><p>D. Operations</p><p><strong>Explanation:</strong> The Software Assurance Maturity Model (SAMM) is an open framework designed to help organizations analyze and improve their software security posture</p><p>While the provided sources do not explicitly list &quot;defect management&quot; as a standalone business function <em>under</em> &quot;Implementation&quot; within SAMM, the broader context of software development security and flaw remediation aligns with the <strong>Implementation</strong> phase2.</p><h3 id="question-17">Question 17</h3><p>You are reviewing a suspicious entry in the logs of your web server and find a request to the URL: https://yourapplication.com/index.asp?name=Mike&apos;;%20DELETE%20*%20FROM%20accounts;%20-- </p><p><strong>What type of attack has been attempted?</strong></p><p><strong>A. SQL injection</strong></p><p>B. Cross-site scripting (XSS)</p><p>C. Cross-site request forgery (CSRF)</p><p>D. Server-side request forgery (SSRF)</p><p><strong>Explanation:</strong> The log entry shows an attempt to insert SQL commands directly into a web application&apos;s URL parameters (DELETE * FROM accounts; --).</p><p>This is a hallmark of a <strong>SQL injection</strong> attack SQL injection attacks occur when an attacker provides &quot;unexpected input to a web application to gain unauthorized access to an underlying database&quot; or to &quot;modify the back-end/server of the web application or execute harmful code&quot;.</p><p>The semicolon (;) is used to terminate the initial query and start a new, malicious one, while the double dash (--) is typically used to comment out the remainder of the original query, preventing it from interfering with the injected command.</p><h3 id="question-18">Question 18</h3><p>You are working with the team developing a new web application and you would like to perform a test that evaluates whether the application is able to successfully handle malicious input that it receives through that interface. </p><p><strong>Which one of the following activities would best meet this need?</strong></p><p>A. Input validation</p><p>B. Parameterized queries</p><p>C. Stored procedures</p><p><strong>D. Fuzz testing</strong></p><p><strong>Explanation:</strong> To evaluate how an application handles malicious input, <strong>fuzz testing</strong> (also known as fuzzing) is the most appropriate activity.</p><p>Fuzz testing is a specialized dynamic testing technique that &quot;submits random, malformed data as inputs into software programs to determine if they will crash&quot; or enter an &quot;unpredictable state&#x201D;.</p><p>It &quot;provides many different types of input to software to stress its limits and find previously undetected flaws&quot;.</p><p>While input validation, parameterized queries, and stored procedures are <em>preventative</em> secure coding practices designed to <em>defend</em> against malicious input like SQL injection, they are not <strong><em>testing methodologies</em></strong> themselves for discovering how an application behaves when it receives such input.</p><h3 id="question-19">Question 19 </h3><p><strong>What is the primary goal of change management in an organization?</strong></p><p><strong>A. Reducing the likelihood of service disruptions</strong></p><p>B. Communicating to all affected stakeholders</p><p>C. Creating an auditable record</p><p>D. Organizing the work associated with a change</p><p><strong>Explanation:</strong> The primary goal of change management is to ensure that modifications to an environment are handled in a &quot;formalized process&quot; that ultimately <strong>reduces the likelihood of service disruptions</strong> or &quot;unintended outages&quot;.</p><p>By requiring changes to be &quot;requested, approved, tested, and documented,&quot; change management minimizes negative impacts on capabilities, functionality, and performance.</p><p>While communicating to stakeholders, creating auditable records, and organizing work are all important aspects and benefits of effective change management, the overarching objective is to maintain stability and prevent adverse effects on services.</p><h3 id="question-20">Question 20 </h3><p>Vivek is the chief information security officer (CISO) for a large organization. She would like to conduct an assessment that will provide her with an accurate view of how an attacker might target her organization. </p><p><strong>What type of assessment would best meet her needs?</strong></p><p>A. Vulnerability assessment</p><p>B. External audit</p><p>C. Internal audit</p><p><strong>D. Penetration test</strong></p><p><strong>Explanation:</strong> To gain an accurate view of how an attacker might target an organization, a <strong>penetration test</strong> is the most effective assessment type.</p><p>Penetration testing (often called ethical hacking) is an &quot;authorized simulated attack&quot; that &quot;mimic[s] real-world attacks to identify methods for circumventing the security features of an application, system, or network&quot;.</p><p>This type of test actively &quot;exploits vulnerabilities and gains access to a system,&quot; providing an attacker-centric view, especially when conducted as &quot;black box testing&quot; with zero prior knowledge, simulating an external attacker. In contrast, a vulnerability assessment identifies known flaws but doesn&apos;t attempt to exploit them, and internal or external audits primarily &quot;test against a published standard&quot; to ensure compliance or find flaws, rather than simulating active adversarial exploitation.</p><h3 id="did-you-enjoy-carlscloud%E2%84%A2-today-and-did-i-help-you-at-all">Did you enjoy CarlsCloud&#x2122; today and did I help you at all?</h3><p>If so, <strong><a href="https://www.buymeacoffee.com/carlscloud?ref=carlscloud.com">buy me a coffee</a></strong> or just shoot me a <a href="https://www.linkedin.com/in/carlballenger/?ref=carlscloud.com"><strong>note via LinkedIn</strong></a> to say thanks it would mean a lot!</p>]]></content:encoded></item><item><title><![CDATA[CarlsCloud™ Study Guide Series: CISSP Mock Exam Deep Dive - Questions 16-20]]></title><description><![CDATA[This two-part blog series for questions #16-20 will present five CISSP mock exam questions followed by a questions #16-20 answers and explanations allowing you to assess your current understanding.]]></description><link>https://carlscloud.com/carlscloud-study-guide-series-cissp-mock-exam-deep-dive-questions-16-20/</link><guid isPermaLink="false">684448db87ba4e00011a4bb9</guid><category><![CDATA[CarlsCloud™ CISSP Exam Prep]]></category><category><![CDATA[CISSP Exam Resources]]></category><category><![CDATA[CISSP]]></category><category><![CDATA[CISSP Study Plans]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Sat, 07 Jun 2025 14:27:16 GMT</pubDate><content:encoded><![CDATA[<p></p><h3 id="welcome-again-future-cissps">Welcome again, future CISSPs!</h3><p>In this installment of our <strong>CarlsCloud&#x2122; Study Guide Series</strong>, we&apos;re taking a closer look at additional CISSP mock exam questions #16-20.</p><p>This continued <strong><a href="https://carlscloud.com/carlscloud-study-guide-series-cissp-mock-exam-deep-dive-questions-16-20/">two-part blog series for questions #16-20</a></strong> will present <strong><a href="https://carlscloud.com/carlscloud-study-guide-series-cissp-mock-exam-deep-dive-questions-16-20/">five CISSP mock exam questions</a> </strong>followed by a <strong><a href="https://carlscloud.com/cissp-mock-exam-review-questions-16-20-answers-explanations/">questions #16-20 answers and explanations</a></strong> allowing you to assess your current understanding.</p><h3 id="question-16">Question #16:</h3><p>Carla is conducting an assessment of an organization using the Software Assurance Maturity Model (SAMM). &#xA0;She notes that the organization seems to have difficulty with defect management and will be reporting that finding. </p><p><strong>Which business function of SAMM includes defect management?</strong><br><br>A. Implementation<br><br>B. Governance<br><br>C. Verification<br><br>D. Operations</p><h3 id="question-17">Question #17 </h3><p>You are reviewing a suspicious entry in the logs of your web server and find a request to the<strong> URL: https://yourapplication.com/index.asp?name=Mike&apos;;%20DELETE%20*%20FROM%20accounts;%20-- </strong></p><p><strong>What type of attack has been attempted?</strong><br><br>A. SQL injection<br><br>B. Cross-site scripting (XSS)<br><br>C. Cross-site request forgery (CSRF)<br><br>D. Server-side request forgery (SSRF)</p><h3 id="question-18">Question #18: </h3><p>You are working with the team developing a new web application and you would like to perform a test that evaluates whether the application is able to successfully handle malicious input that it receives through that interface. </p><p><strong>Which one of the following activities would best meet this need?</strong><br><br>A. Input validation<br><br>B. Parameterized queries<br><br>C. Stored procedures<br><br>D. Fuzz testing</p><h3 id="question-19">Question #19:</h3><p><strong>What is the primary goal of change management in an organization?</strong><br><br>A. Reducing the likelihood of service disruptions<br><br>B. Communicating to all affected stakeholders<br><br>C. Creating an auditable record<br><br>D. Organizing the work associated with a change</p><h3 id="question-20">Question #20:</h3><p>Vivek is the chief information security officer (CISO) for a large organization. She would like to conduct an assessment that will provide her with an accurate view of how an attacker might target her organization. </p><p><strong>What type of assessment would best meet her needs?</strong><br><br>A. Vulnerability assessment<br><br>B. External audit<br><br>C. Internal audit</p><p>D. Penetration test</p><h3 id="did-you-enjoy-carlscloud%E2%84%A2-today-and-did-i-help-you-at-all">Did you enjoy CarlsCloud&#x2122; today and did I help you at all?</h3><p>If so, <strong><a href="https://www.buymeacoffee.com/carlscloud?ref=carlscloud.com">buy me a coffee</a></strong> or just shoot me a <a href="https://www.linkedin.com/in/carlballenger/?ref=carlscloud.com"><strong>note via LinkedIn</strong></a> to say thanks it would mean a lot!</p>]]></content:encoded></item><item><title><![CDATA[Passed the CCSP Exam!  My study resources used and thoughts on the ISC2 CCSP exam]]></title><description><![CDATA[Took the CCSP exam and passed on the 1st attempt!  Glad to get it done for sure and hoping to pay knowledge forward to help others out on their certification journey.]]></description><link>https://carlscloud.com/passed-the-ccsp-exam-my-study-resources-used-and-thoughts/</link><guid isPermaLink="false">67e96e42d0a94f0001021817</guid><category><![CDATA[CCSP]]></category><dc:creator><![CDATA[Carl Ballenger, CISSP, CCSP]]></dc:creator><pubDate>Sun, 30 Mar 2025 16:33:59 GMT</pubDate><media:content url="https://ghost5.storage.googleapis.com/2025/03/ccsp-carlballenger.png" medium="image"/><content:encoded><![CDATA[<img src="https://ghost5.storage.googleapis.com/2025/03/ccsp-carlballenger.png" alt="Passed the CCSP Exam!  My study resources used and thoughts on the ISC2 CCSP exam"><p>Took the <a href="https://www.credly.com/badges/d156c452-2bf7-4243-b4ee-22a0d945e27e?ref=carlscloud.com"><strong>CCSP exam and passed</strong></a> on the 1st attempt! &#xA0;Glad to get it done for sure and hoping to pay knowledge forward to help others out on their certification journey.</p><p>If you have not read other articles on my site... &#xA0;I&apos;m a current <a href="https://carlscloud.com/my-cissp-study-resources-and-journey-april-2023/#cissp-exam-study-materials-resources"><strong>CISSP holder</strong></a> and passed the <a href="https://carlscloud.com/officially-a-cissp-woot/"><strong>CISSP exam in mid 2023</strong></a>. &#xA0;The knowledge/study efforts from that <strong>definitely </strong>helped with the <strong>carryover subject matter for this exam</strong>...although obvious differences in focus toward cloud specific security/domain areas.</p><p>I studied for ~2 months off and on at beginning of this year January 2025 and hard this past March 2025 and used the primary resources:</p><h3 id="pocket-prep-ccsp"><a href="https://www.pocketprep.com/?ref=carlscloud.com" rel="noopener nofollow ugc">Pocket Prep CCSP</a></h3><p>Paid for a month subscription to get the 1,000 bank of questions which I worked through to understand weak areas. The references to the CBK and OSG and other external cloudsec reference doc material for each question was definitely helpful imo to research and further understand weak subject areas further. The quick quiz features and missed questions/custom exam quiz functionality of app was useful.</p><h3 id="learnzapp-official-isc2-ccsp-app">Learnzapp official ISC2 CCSP app</h3><p>Paid for a month of questions, but honestly some questions seem dated and not as /updated relevant as the Pocket Prep CCSP. Although I did take 7 of the 8 practice exams and was scoring in the 75-85% range on them so practice exams for those were useful for confidence reinforcement etc.</p><h3 id="ccsp-isc2-official-study-guide3rd-edition"><a href="https://www.amazon.com/Certified-Cloud-Security-Professional-Official-ebook/dp/B0BCZVQBB3/ref=tmm_kin_swatch_0?ref=carlscloud.com" rel="noopener nofollow ugc">CCSP ISC2 Official Study Guide - 3rd edition</a></h3><p>Kindle format - The book was a good foundation for overall knowledge and what to expect from exam. As with CISSP exam I used the OSG with CCSP. It definitely helped with overall exam expectations and focus...although of course at times very dry.</p><h3 id="pete-zerger-ccsp-exam-cram-on-youtube"><a href="https://www.youtube.com/watch?v=kFZWMZIy5LM&amp;ref=carlscloud.com" rel="noopener nofollow ugc">Pete Zerger, CCSP Exam Cram on YouTube</a> </h3><p>Just like with the CISSP exam prep content he has produced and helped so many...you can&apos;t go wrong here either. A tremendous resource that is 100% free. I&apos;d argue some could likely pass with just his YT video prep material, but obviously I&apos;d suggest using multiple resources.</p><h3 id="mike-chapple%E2%80%99s-last-minute-ccsp-review"><a href="https://certmike.com/ccsp/?ref=carlscloud.com" rel="noopener nofollow ugc">Mike Chapple&#x2019;s Last Minute CCSP Review</a></h3><p>I did end up grabbing this in the last week to prep. Honestly probably could have gone without it, but does reinforce a lot of important exam focused content in a 17 page concise document.</p><h3 id="alukos-ccsp-resources"><a href="https://ccsp.alukos.com/?ref=carlscloud.com">Alukos CCSP Resources</a></h3><p>Very good indexed resource for complete mapped &#xA0;CCSP exam topics to the 6 domains. &#xA0;</p><p>Happy to answer any questions and again good luck!!!</p><blockquote>PS - Also highly recommend the <a href="https://www.reddit.com/r/CCSP/?ref=carlscloud.com"><strong>CCSP subreddit</strong></a> for information on the CCSP exam and resources others have found helpful.</blockquote><blockquote>My CCSP exam thoughts post on <a href="https://www.reddit.com/r/CCSP/comments/1ji2tqr/passed_ccsp_study_resources_used_and_thoughts/?ref=carlscloud.com"><strong>Reddit /CCSP</strong></a></blockquote><p>Did you enjoy <strong>CarlsCloud&#x2122;</strong> today and did I help you at all?</p><p>If so, <strong><a href="https://www.buymeacoffee.com/carlscloud?ref=carlscloud.com">buy me a coffee</a></strong> or just shoot me a <a href="https://www.linkedin.com/in/carlballenger/?ref=carlscloud.com"><strong>note via LinkedIn</strong></a> to say thanks it would mean a lot!</p>]]></content:encoded></item></channel></rss>