
"“When I joined Vectra AI, I cared about the technical health of the site, but the real mission was bringing in traffic,” Cardiet wrote in an email to IT Brew. “Trust is what makes that work, especially in cybersecurity, where the audience has zero patience for marketing language and is hunting for content that actually teaches them something.”"
"“I did not get the chance to study engineering, so I went into sales and marketing,” Cardiet wrote. “But I read a lot, and what I have learned is that with curiosity and motivation, you can take yourself further than your original path suggests.”"
"Cardiet said that when she first started training in cyber, she discovered open-source intelligence (OSINT), or the practice of drawing from public sources like social media and websites to evaluate cyber threats. From there, her training consisted of hundreds of hours of self-study, including the StationX cybersecurity series, as well as practice on Hack The Box and TryHackMe, which led to certification tracks like Certified Ethical Hacker (CEH)."
A cyber threat research manager transitioned from digital marketing and web development into cybersecurity. Early work involved freelancing for small businesses and IT companies, followed by web marketing consulting and a full-time marketing role. Moving into cybersecurity required writing technical content, which drove deeper topic understanding. The transition relied on curiosity and motivation rather than formal engineering study. Training began with open-source intelligence using public sources to evaluate threats. Hundreds of hours of self-study followed, including structured learning resources and hands-on practice platforms. Progress led to certification pathways such as Certified Ethical Hacker (CEH).
Read at IT Brew
Unable to calculate read time
Collection
[
|
...
]