"Why Does the Consulting Market Exist?"

 "Why Does the Consulting Market Exist?"

Every family has a tech guru, called upon when the internet goes down or the family PC/laptop runs too slow, I was my families tech guru from the age of 10.

Before we get into the nitty-gritty of this article, I'd like to briefly outline why I decided to write it. There are few key reasons:

  1. The UK governments decision to break up the 'Big Four' (B4). (Something I wholeheartedly back and I hope to convince you is a correct decision.)
  2. My time at the B4 has come to an end, for now, so I feel safe to voice my opinions.
  3. Lock down and gardening leave has given me ample time to reflect on my time at the B4 firm and sadly, I don't look back on all my time fondly.

About me: (Although this section may not interest you, understanding my prior experience is key to understanding my comments about the B4.)

Every family has a tech guru, called upon when the internet goes down or the family PC/laptop runs too slow, I was my families tech guru from the age of 10. However, in reference to cyber security I only knew the basic's. What trojans, adware or keyloggers were, a little about how they worked but I couldn't programme a GUI-less calculator let alone investigate,dissect or build my own malware. I had a general overview of what cryptocurrency was, how it worked, and how it gave rise to a new type of malware, ransomware. However, again I knew nothing more.

I graduated with a Computer Science degree in August 2016, this took my skills from beginner to novice. I know knew the fundamentals of how computers, the internet and basic encryption worked, alongside some scripting in Python, Java and machine language. Yet, I knew nothing of what a Security Operations Centre (SOC) was, or the software they used such as:

  • a Security Information and Event Management (SIEM)
  • Vulnerability Scanning and Management (VM) platform
  • Endpoint Detection and Response (EDR) tooling
  • Security Orchestration, Automation and Response (SOAR)

security

Bootstrap 5 Complete Course with Examples

Bootstrap 5 Tutorial - Bootstrap 5 Crash Course for Beginners

Nest.JS Tutorial for Beginners

Hello Vue 3: A First Look at Vue 3 and the Composition API

Building a simple Applications with Vue 3

Deno Crash Course: Explore Deno and Create a full REST API with Deno

How to Build a Real-time Chat App with Deno and WebSockets

Convert HTML to Markdown Online

HTML entity encoder decoder Online

Best Custom Web & Mobile App Development Company

Top Web & Mobile Application Development Company in India & USA. We specialize in Golang, Ruby on Rails, Symfony, Laravel PHP, Python, Angular, Mobile Apps, Blockchain, & Chatbots

10 Cyber Security Tools to Watch Out for in 2021 - DZone Security

In this article, take a look at ten cyber security tools to watch out for in 2021, including NMap, Wireshark, Metasploit, and more!

How to Keep Your Java Applications Secure - DZone Security

The solution to keeping your Java applications secure is simple: make sure they stay up to date. Check out the details within.

What are the top Cyber Security Threats in 2020?

Learn Cyber Defense programming by Cyber Security Training. Know how to stop tactics of ransomware, malware, social engineering, phishing by hacking course.

Cloud Security: Is it Worth it?

Storing and managing corporate data by applying the cloud is becoming more and more popular. Companies grow, and it gets too expensive, and resources consuming to store their data on traditional servers. To prove it, look at the research conducted by Google in 2019 that includes insights for the cloud computing market for the next 10 years.