Innovative Recruitment Practices Can Close the Cyber Skills Gap

Innovative Recruitment Practices Can Close the Cyber Skills Gap

Developing more innovative hiring practices is crucial to attracting more talent to the cybersecurity industry, according to panelists speaking during a recent RSA webcast. The event was held amid growing efforts from the US federal government to attract new candidates to the cybersecurity industry to close the burgeoning skills gap. Barbara Endicott-Popovsky, executive director of Center for Information Assurance and Cybersecurity and professor at the University of Washington, stated: “It’s been frustrating to watch the lack of awareness of…

Read More

3 Ways Technology can Power an Inclusive Future – Cisco Blogs

3 Ways Technology can Power an Inclusive Future – Cisco Blogs

Since the onset of the pandemic, technology and digital innovation has enabled us to maintain a semblance of business and life-as-usual. Technology has underpinned the continuity of economic and social activity during the crisis, and this digital enablement is here to stay even as countries begin to emerge out of the pandemic. However, the current reliance on technology has raised the stakes around digital readiness and exacerbating the digital divide for those without the skills,…

Read More

Drug Dealers Get 27 Years After Police Crack EncroChat Comms

Drug Dealers Get 27 Years After Police Crack EncroChat Comms

A drug dealer has been given a ten-year jail sentence after officers monitored his encrypted communications with other suppliers, according to the National Crime Agency (NCA). Lee Broughton, 40 from Epsom, was sentenced last week at Kingston Crown Court after pleading guilty back in April to supplying cocaine. His case was one of the many that the NCA is working on as part of Operation Venetic, after international law enforcers cracked a popular encrypted chat platform….

Read More

Cybercrime Losses Triple to £1.3bn in 1H 2021

Cybercrime Losses Triple to £1.3bn in 1H 2021

Individuals and organizations lost three times more money to cybercrime and fraud in the first half of the year compared to the same period in 2020, as incidents soared, according to new figures. The data comes from the National Fraud Intelligence Bureau (NFIB), which collects reports of cybercrime and fraud from Action Fraud, the UK’s national reporting center for such crimes. It revealed that between January 1 and July 31 2020, victims lost £414.7m to…

Read More

Tech CEOs to Discuss Cybersecurity with Biden Today

Tech CEOs to Discuss Cybersecurity with Biden Today

The CEOs of some of the world’s biggest tech companies are set to meet President Biden today to discuss how their products can improve the security of America’s businesses and critical infrastructure providers, according to a report. Apple boss Tim Cook, Amazon CEO Andy Jassy and Microsoft supremo Satya Nadella are attending the meeting. At the same time, the CEOs of Google, IBM, JP Morgan Chase and utility firm Southern Co have also been invited,…

Read More

Peace of Mind with Cloud ACI and the Power of Configuration Drift – Cisco Blogs

Peace of Mind with Cloud ACI and the Power of Configuration Drift – Cisco Blogs

Enterprise IT spends a lot of time designing their cloud networks. This includes thinking about the best way to achieve network segmentation and policy segmentation for workloads, securing workloads by cloud native security policies, and inserting traffic inspection devices such as firewalls for traffic that needs to be scrutinized. While a good design is the first step, choosing a solution that can help automate the configuration for the cloud network is an important next step….

Read More

Ruling the Hybrid Cloud with Cisco Nexus Dashboard One View – Cisco Blogs

Ruling the Hybrid Cloud with Cisco Nexus Dashboard One View – Cisco Blogs

One Ring to rule them all,One Ring to find them,One Ring to bring them alland in the light unite them.― with a tip of the hat to J.R.R. Tolkien Hierarchy and Federation have been the concepts on which most of the complex problems in large scale distributed systems have been solved. Network management in the hybrid cloud is no exception to this. Data Center network deployments have evolved from a 3-Tier Access-Aggregate-Core hierarchical topology to…

Read More

The attack cycle, mass shootings and lone wolves: What companies should know

The attack cycle, mass shootings and lone wolves: What companies should know

The attack cycle, mass shootings and lone wolves: What companies should know | 2021-08-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Four ways SMBs can protect themselves from cybersecurity threats

Four ways SMBs can protect themselves from cybersecurity threats

Four ways SMBs can protect themselves from cybersecurity threats | 2021-08-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Linux turns 30

Linux turns 30

Something happened back in 1991 that dramatically changed the future of computing. Linus Torvalds, a Finnish-American software engineer, released the Linux kernel and the second version of the GNU General Public License (GPLv2). A good portion of the technology we use today would not be what it is had this not happened. It all started on August 25th of that year when Torvalds announced in a usenet post that he was working on a free…

Read More
1 3,580 3,581 3,582 3,583 3,584 3,997