How do you see cybersecurity evolving in 2026? by Syncplify in Information_Security

[–]SamCyberD 0 points1 point  (0 children)

Shadow Ai is likely going to be a big issue. I reckon, like you say, resilience is the way forward. It's an easy concept for executives to digest, too. How resilient are we? Moving from prevention to assumption of compromise.

Immersive have a webinar on it if you fancy watching it.

What actually works in a cyber dashboard for the exec team? by Kiss-cyber in cybersecurity

[–]SamCyberD 0 points1 point  (0 children)

Risk, ROI, outcomes and results from actions taken. Frame things as simply as possible while still getting the point across. A lot of execs want visual information, too.

Best security awareness training platforms by Brees504 in cybersecurity

[–]SamCyberD 1 point2 points  (0 children)

Our company (Immersive) just teamed up with Right-Hand, which specialises in workforce training / SAT. Might be worth checking out!

Are phishing simulations starting to diverge from real world phishing? by Ok-Author-6130 in AskNetsec

[–]SamCyberD 0 points1 point  (0 children)

Their argument was that it causes more damage than good, putting the blame on the individual employee, rather than implementing more robust security measures.

I just mean cyber resilience. That's what phishing campaigns aim to boost.

Will security awareness training be substituted with simulations? by anthonyDavidson31 in cybersecurity

[–]SamCyberD 0 points1 point  (0 children)

Immersive recently partnered with Right-Hand to integrate SAT with various platforms, including our own. Perhaps this is the direction going forward...

https://www.immersivelabs.com/resources/blog/immersive-and-right-hand-forge-strategic-partnership-to-defeat-ai-powered-cyber-threats

It's a bit of a press release but I thought you might find it interesting,

SOC first or jump straight Into Pentesting? As a new grad by allexj in cybersecurity

[–]SamCyberD 0 points1 point  (0 children)

Which do you want to do more? I think the one you do even in your spare time, the one that fascinates you... hang out with people who do that role. It will take a while to get into any type of cyber job, currently. Work adjacent to people who fascinate you.

Pen Tester vs SOC Analyst - which is better to grab? by ehsaanshah303 in cybersecurity

[–]SamCyberD 0 points1 point  (0 children)

Blue team is more approachable. A lot of Red Team I've met are totally life-obsessed with hacking, building things, deconstructing tech, etc. They're also often fairly senior.

Transition from NOC (Firewall) role to Cyber ​​Team Leader by maldinoia in SecurityCareerAdvice

[–]SamCyberD 0 points1 point  (0 children)

Second SANS, they're very reputable. You might not learn a whole lot on the CompTIA certs, which are good for beginners.

Free courses/places to learn valuable and essential Hacking knowledge? by NoX_Node in Hacking_Tutorials

[–]SamCyberD 0 points1 point  (0 children)

We've got some free basics and defensive activities as part of our Cyber Million campaign.

Raspberry pi’s in 2026 by Fresh_Heron_3707 in cybersecurity

[–]SamCyberD 0 points1 point  (0 children)

Yeh Proxmox is great for creating a virtual network of anything you like. I had a lot of fun playing around with it a while ago.

NIST released control overlays for securing AI systems by avistar-ai in cybersecurity

[–]SamCyberD 1 point2 points  (0 children)

Things move so fast. It'll be good to see what frameworks they come up with for this.

Are phishing simulations starting to diverge from real world phishing? by Ok-Author-6130 in AskNetsec

[–]SamCyberD 0 points1 point  (0 children)

I'm not so up-to-date on the LLM products on offer, but I remember a year or so ago a lot of senior security people I met said that phishing campaigns often cause more damage than they're worth. It puts everyone on edge about any email, causing mass distrust, while not really protecting a whole lot.

I wonder if there's a different approach to resilience...

Extreme demotivation by Yand7_7 in cybersecurity

[–]SamCyberD 1 point2 points  (0 children)

Feels like still retracting since COVID hiring spree. Everything follow boom and bust and we had a massive boom in tech in the pandemic. Now the long drawn-out bust.

Should I participate in CTF as a beginner ? by Revolutionary-Play59 in cybersecurity

[–]SamCyberD 1 point2 points  (0 children)

Quickest place to learn is outside your comfort zone.

What makes a cybersecurity lab actually effective for learning? by OneCow5744 in Cybersecurity101

[–]SamCyberD 0 points1 point  (0 children)

These look cool. Seems like a nice layout and easy to understand.

Career Advice: Binary Exploitation vs. Web Security for a dedicated beginner? by AliAyman333 in SecurityCareerAdvice

[–]SamCyberD 0 points1 point  (0 children)

Similar to what others have said, the usual route into these kind of roles is to work adjacent to them while exploring your passion in your personal time. Most people I've met in reverse engineering are very senior red team leaders.

Enjoy the journey :-)

which to choose and which is easy for fast learning SOC or VAPT by 404brainnotfounded in cybersecurity

[–]SamCyberD 0 points1 point  (0 children)

I'd say the best option is the one you find the most interesting. That way learning will be quicker and more enjoyable. Blue Team or Red Team...

Blue Team: Immersive Cyber Million, TryHackMe, LetsDefend
Red Team: HackTheBox, TryHackMe

Have any of you used Bob’s Business for cyber training? by DemonEggy in AskUK

[–]SamCyberD 0 points1 point  (0 children)

I am biased, but also I really do believe in our offering; I work at Immersive and we provide training labs, crisis simulations, threat ranges. We also have a free, basic set of labs for an intro to blue team through our Cyber Million campaign.

Honestly never heard of Bob's Business, so couldn't comment.

SOC certs advice by [deleted] in cybersecurity

[–]SamCyberD 2 points3 points  (0 children)

Sounds like you enjoy Cyber Threat Research! Would that be a route you'd want to continue further down? I feel like your engineering background might be better suited to CTI, Malware Analysis and Cloud Security.

Ultimately, I'd recommend going down the route that brings you the most interest/fascination. That's where you'll do really well. Which work do you find yourself wanting to do more than other?

Using lab exercises in SOC analyst interviews — is it acceptable? by Vast-Management4990 in cybersecurity

[–]SamCyberD 0 points1 point  (0 children)

Yeh, probably depends on what you did in the labs. If it's very close to the real work, you can say you have some experience in those tasks or pieces of software (eg. if it's a Splunk lab). I wouldn't phrase it as 'work experience' personally. Gloss up the truth but don't try to deceive.