BlueTeam6

Entry level cyber security careers generally only require basic math concepts that are used in binary, cryptography or programming tasks. Higher level math concepts such as calculus are not required in most cyber security positions, but may be a requirement in certain cyber security degree programs or advanced level careers.

BlueTeam6 wrote
1

I totally agree. This website looks a free Wix template that someone set up over the weekend for some amateur placeholder website, not like a website I would expect from a huge and important organization, and especially not from a government organization. Click on the "Motivational Speaker" template here and compare them

BlueTeam6 wrote
1

Astonishing

Paragraph So the absolute latest and greatest mobile phone network technology, the one that (along with IPv6) was going to allow absolutely ubiquitous embedded systems in anything that moves (and a lot of things that don't move, or don't move after they've been bolted / screwed / nailed / welded into place),.. that technology... has well-known, long-standing weaknesses in the protocols and architecture? You could knock me down with a feather. It's almost as if the designers, architects and research engineers were subconsciously making sure there'd be a need for designers, architects and engineers to develop 6G at some point. Or something.

BlueTeam6 wrote
1

Am I reading this right?!

How is it that we allow employees of a company to perform criminal actions and then get off by having their employer simply pay a fine... after they've already destroyed and consumed the target of that criminal activity?

If this was the banking industry instead of entertainment, there'd be an incoming wave of pitchforks, followed by prison sentences...

BlueTeam6 wrote
1

Data breach hits 30,000 signed up to workplace pensions provider _theguardian.com
| posted by BlueTeam6 in : attacks | 1 comment |
1

How companies can use automation to secure cloud data _techrepublic.com
| posted by BlueTeam6 in : corporate | 1 comment |
1

'Long-standing vulns' in 5G protocols open the door for attacks on smartphone users _theregister.com
| posted by BlueTeam6 in : research | 3 comments |
0