Depending on who you talk to, there are 50,000 to 60,000 open jobs available for cybersecurity professionals in the United States – add risk management professionals, and the number climbs much higher. The rub is how to match the perfect candidates to the perfect job because it’s as easy as it sounds.
- By Jeff Steuart
- Aug 02, 2021
Haystack Solutions’ new Cyber Aptitude and Talent Assessment (CATA) has been shown in tests conducted at the University of Maryland’s (UMD) Applied Research Laboratory for Intelligence and Security (ARLIS) Center to provide cybersecurity aptitude assessments that predict candidate success with uncanny precision.
Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore access.
Digital Transformation (DX) should be an important area of strategic focus for companies that want to grow and thrive in a changing world.
- By John Milburn
- Jul 06, 2021
Versa Networks has announced that it has raised $84 million in a Series D funding round, bringing the company’s total amount raised in funding to $196 million.
Brinqa™ is a global leader in Cyber Risk Management. The company’s applications leverage the industry's only Knowledge Graph for cybersecurity – The Cyber Risk Graph.
One of Minvera Labs’ clients, a midsize critical infrastructure organization, was almost disabled or worse, because of an innocent mistake made by one of their employees.
Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives.
- By Brian Baker
- Jun 01, 2021
The Department of Homeland Security’s Transportation Security Administration (TSA) announced a Security Directive that will enable the department to better identify, protect against and respond to threats to critical companies in the pipeline sector.
Trend Micro Incorporated recently released results from a new study that reveals SOC and IT security teams are suffering from high levels of stress outside of the working day—with alert overload a prime culprit.
Dr. Melanie Bailey is a fellow of the Engineering and Physical Sciences Research Council (EPSRC). Her team has identified differences between the fingerprints of people who touched cocaine compared with those who have ingested the drug, even if the hands are not washed.
Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives.
- By Brian Baker
- May 24, 2021
Numerous commissions, studies and papers continue to point to the stifling effects of the DoD procurement system on production, efficiency, and innovation as well as lead to bloated price tags like the F-35.
- By Bryson Bort
- May 20, 2021
Cybersecurity experts have long warned of attacks on small municipal systems. Until hackers accessed the water treatment plant of a small Florida city this year, those warnings were “out of sight, out of mind.” Now, both local and national authorities’ perspectives on the dangers of cybersecurity attacks are changing.
- By Jeremy Rasmussen
- Apr 05, 2021
There is no doubt that Artificial Intelligence (AI) is here to stay, as new AI-driven solutions are pervasive across every category of professional and consumer electronics today.
- By Bill Brennan
- Apr 01, 2021
Cloud-based technology and solutions have become more and more mainstream, especially in the commercial security industry.
- By Kim Hartman
- Apr 01, 2021
Data Theorem Inc., today introduced the industry’s first application-aware full stack cloud security product with attack surface management (ASM) for protecting data in cloud-native apps, API services and serverless cloud functions.
Artificial Intelligence (AI) continues to gain momentum every day, and it is already poised to augment and enrich many aspects of our business and personal lives.
Today’s analytics are not only better able to differentiate between true security incidents and false alarms, but can be programmed to trigger when a given event occurs.
- By Alex Walthers
- Mar 02, 2021
Supporters of Prop. 24 posited the CCPA privacy law, even though it had just gone into effect earlier in the year, wasn’t strong enough.
- By Richard Kanadjian
- Mar 02, 2021