article thumbnail

GUEST ESSAY: The case for using augmented reality (AR) and virtual reality (VR) to boost training

The Last Watchdog

Augmented reality (AR) and virtual reality (VR) technologies provide intriguing opportunities for immersive and interactive experiences in cybersecurity training. Related: GenAI’ impact on DevSecOps Here’s how these technologies can bridge learning gaps in cybersecurity awareness and enhance the overall training experience.

article thumbnail

GUEST ESSAY: Sure steps to achieve a robust employee cybersecurity awareness training regimen

The Last Watchdog

Employee security awareness is the most important defense against data breaches. Related: Leveraging security standards to protect your company. Create security awareness for employees. One of the most important ways to protect against data breaches is to increase employee security awareness. Change passwords regularly.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OpenAI Is Not Training on Your Dropbox Documents—Today

Schneier on Security

There’s a rumor flying around the Internet that OpenAI is training foundation models on your Dropbox documents. ” Willison expands this in a blog post , which I strongly recommend reading in its entirety. Here’s CNBC. Here’s Boing Boing. It seems not to be true. We have no reason to. At least, in the US.

Privacy 108
article thumbnail

GUEST ESSAY: A call to blur the lines between cybersecurity training, up-skilling and higher ed

The Last Watchdog

Related: Cultivating ‘human sensors’ They may not entirely realize that when compounded, these two concerns could pose a critical security threat for their organization. Losing the security talent that they do have to what has been called the Great Resignation. Today, there are more paths into cybersecurity than ever.

article thumbnail

Why your IT team needs cyber security training

IT Governance

Organisations often fall into the trap of lumping cyber security together with their other IT functions. Although they are obviously connected – anti-malware, firewalls and a host of other technologies are a core part of cyber security – there is a lot more to it. What they need is a wider understanding of cyber security.

IT 96
article thumbnail

How Microsoft Training Boosts an ISO 27001 Qualification

IT Governance

If you’re serious about information security, you should consider gaining a Microsoft qualification. ISO 27001 is often considered the go-to qualification for information security professionals. There’s a huge demand for qualified administrators and cyber security professionals. Cloud security with Microsoft Azure.

Cloud 109
article thumbnail

Train Your Team to Ensure You Achieve ISO 27001 Certification

IT Governance

Implementing an ISO 27001-compliant ISMS (information security management system) can seem complex, and it’s often difficult to know how the Standard’s specifications should be applied to your organisation. Your implementation team must be appropriately trained to ensure the success of your ISO 27001 project. Leadership is key.