I2P network proposed as the next hiding spot for criminal operations
The success of the recent law enforcement operations that have cracked down on criminal services operating on the Tor network is now causing a shift in the criminal landscape.
There are now criminally-focused services that are actively moving sites or are being asked by customers to move operations from the Tor network to an alternative known as the Invisible Internet Project (I2P).
Cybercrime & The Bottom Line: 5 Reasons Why SMEs Can’t Ignore Cyber Security.
The digital world offers many opportunities for business growth however it exposes organisations to new cyber risks. Weak cyber security can leave organisations exposed and the revenue repercussions can be severe. Joe Collinwood, CEO at CySure identifies the risks and how to mitigate them.
Microsoft Boosts Shadow IT Discovery for Cloud Security
Microsoft announced that the Shadow IT discovery capabilities of Microsoft Cloud App Security have been expanded to also allow monitoring of Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) resources.
The updated Microsoft Cloud Access Security Broker (CASB) now allows organizations to keep track of business-critical resources hosted on Microsoft Azure blobs, Amazon Web Services S3 buckets, or Google Cloud Platform storage buckets.
A cybersecurity worker shortage in Colorado has the industry tapping veterans to fill the gap
“We promote broadly. However, we do get a lot of interest from veterans,” said Bret Fund, a SecureSet cofounder who estimates that 40% of its students are veterans. “For a lot of them, their time in the military trains them on a lot of principles that resonate with cybersecurity professionals. It’s easy for them to pick up and transition to this space.”
How automation will affect IT jobs
Machines have gained an upper hand in its war with humans. Earlier, computers were beating us in games like chess, Jeopardy and Go but with the advent of AI-driven algorithms, jobs of doctors, lawyers, teachers, and IT professionals among others are now being tackled.
McKinsey estimates that using current technologies, roughly half of all work activities could be automated and up to 30% of global workers could be displaced by 2030.
Beyond Boundaries: Smartphone Security Borderless Society
With greater connectivity, comes a greater risk.
This can be a cause of concern and stress for many of us. In a world that expects us to be connected anywhere and at any time, we often fail to understand that this means we are also at risk – everywhere and at all times.
Cyberbit Announces Enhancements to Cyberbit Range That Personalize and Scale Cybersecurity Training and EducationEnglish
Cyberbit, today announced enhancements to Cyberbit Range, the most widely deployed cybersecurity training and simulation platform. With this release, Cyberbit has introduced virtual instructor functionality and new training content that enables enterprises and academic institutions to deliver a richer, more personalized, and scalable training experience to cybersecurity practitioners and students.
ISACA Outlines New Pathways and Training Resources for Cybersecurity Careers
According to new research, nearly 30 percent of those hiring for a cybersecurity position say fewer than one-quarter of job applicants are qualified.
To help cybersecurity professionals prepare for a strong career path, ISACA’s Cybersecurity Nexus (CSX) program has outlined clear paths for three types of cybersecurity careers:
Coding Boot Camps Offer Opportunity, But Not Always Transparency
CODING BOOT CAMPS typically cost thousands of dollars and take a few months to complete. In return for that invested money and time, they promise to prepare participants for hot jobs in data science, cybersecurity and software development – one of the occupations predicated to have the most new job openings and highest growth rate by 2026, according to the Bureau of Labor Statistics.