The aim of cyber attacks traditionally has been to either disrupt the target’s web service or to steal important information and other assets. A new and quickly spreading phenomenon is to steal computing power to mine cryptocurrencies. What is most alarming is that, in addition to advanced cyber attacks aimed at elaborate systems, criminals will use any device connected to the Internet – for example, your mobile phone or a remotely controlled heat pump. More...

At a recent technology breakfast, I heard an attendee ask a speaker about an approach to modernize security. The question reminded me of a thought I’ve had often: You can’t build without a foundation. Modernizing security sounds like a great goal, but the reality is, most organizations are still struggling with the basic elements of securing information and information assets. New tools and technologies can make a big difference, but organizations must first deploy sound policies and processes to protect data and information assets. More...

Across business and technology media alike, I’ve seen frequent coverage of the hundreds of thousands of cybersecurity and IT security job openings that are not getting filled. By 2022, the cyber talent gap is estimated to exceed 1.8 million jobs. In all industry verticals we continue to hear about more companies and government agencies suffering from cyber-related breaches and ransomware attacks. There is no question that supply is low, demand is high, and that the demand is not abating. More...

Pages