ITPro.TV

The Ultimate Guide to IT Certifications

ITPro.TV

A complete guide to IT certifications The tech industry is rapidly expanding, and the demand for IT skills in the workforce is growing. A career in IT can be rewarding and has longevity. In order to thrive in a tech career, it is important to stay up–to–date with the ever-changing world of technology by earning certifications.

IT 63

What is going on over at Microsoft? AZ – 100, 101, and 103 explained

ITPro.TV

Last September, at Microsoft Ignite in Orlando, Microsoft showcased several new role-based certifications. As an early adopter, I naturally was excited to learn about the new certifications and began researching and preparing to take the AZ-100 and AZ-101 certification exams. I have already sat and passed the AZ-100 exam, and I have begun preparing to … Continue reading What is going on over at Microsoft?

IT 63
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The New Next Level Certifications from Cisco: An Overview

ITPro.TV

As you may have heard, this week, Cisco announced their new Next Level IT certifications during the Cisco Live event. In this blog, resident Cisco and networking edutainer Ronnie Wong walks you through what’s new, what to study now, and what the announcement means to you.

IT 58

4 Easy Steps to Break into the IT Field

ITPro.TV

So, you’ve been considering it for a while, and you’ve decided to take that leap of faith and break into the IT field. Great! Information technology is an ever-evolving field with numerous specializations that are in very high demand. According to research from Fosster, the top 10 most in-demand IT jobs all have salaries in the 6-figure range.

IT 55

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

Who Needs CompTIA IT Fundamentals+ Certification?

ITPro.TV

What is CompTIA IT Fundamentals+? CompTIA IT Fundamentals+ is a certification designed to help aspiring IT professionals decide if a career in IT is right for them. It helps develop a broader understanding of IT, and is the only single certification that encompasses all areas of IT foundations. This makes it the ideal certification for … Continue reading Who Needs CompTIA IT Fundamentals+ Certification? → The post Who Needs CompTIA IT Fundamentals+ Certification?

IT 48

Why now is the right time to start working in cybersecurity

ITPro.TV

IT Security in Today’s Environment If the constant, news about ransomware attacks and security breaches is not enough to highlight the critical importance of cybersecurity roles today, nothing will. The world is full of bad actors intent on doing harm to businesses, governments, and individuals.

5 Security Certifications That Will Boost Your IT Career

ITPro.TV

If you have been on the fence about whether or not a security certification would benefit your IT career, the short answer is – yes. Putting in the time and effort to earn an in-demand certification can significantly boost your salary. Also, it may open doors to a wealth of new opportunities. So, how do … Continue reading 5 Security Certifications That Will Boost Your IT Career → The post 5 Security Certifications That Will Boost Your IT Career appeared first on ITProTV Blog.

IT 40

At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft’s Email Software

Krebs on Security

Three Top Russian Cybercrime Forums Hacked

Krebs on Security

Over the past few weeks, three of the longest running and most venerated Russian-language online forums serving thousands of experienced cybercriminals have been hacked.

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Researchers Disclose More Malware Used in SolarWinds Attack

Data Breach Today

Microsoft, FireEye Find Additional Payloads Used During Supply Chain Attack Researchers with Microsoft and FireEye are disclosing additional malware used by the hacking group that targeted SolarWinds last December.

223
223

Ryuk Ransomware Updated With 'Worm-Like Capabilities'

Data Breach Today

Prolific Ransomware Can 'Spread Automatically' Inside Networks, CERT-FR Warns Prolific Ryuk ransomware has a new trick up its sleeve. "A

Exchange Server Attacks Spread After Disclosure of Flaws

Data Breach Today

Forecast Calls for Backdoored Email and Possibly Ransomware, Cryptominers One day after Microsoft disclosed four serious flaws in Microsoft Exchange email servers, attackers are going on a wide hunt for vulnerable machines, experts say.

Senators Grill Cybersecurity Execs on SolarWinds Attack

Data Breach Today

FireEye, Microsoft, CrowdStrike Offer New Details and Recommendations The CEOs of SolarWinds, Microsoft, FireEye and CrowdStrike rolled out a series of cybersecurity recommendations to a U.S.

The Best Data Retention Policy & Template To Get You Started

In this whitepaper from Onna, we will walk you through data retention best practices and provide you with a downloadable template to help you get organized and gain better visibility into your data’s lifecycle.

Indian Vaccine Makers, Oxford Lab Reportedly Hacked

Data Breach Today

Incidents Spotlight Growing COVID-19-Related Cyberthreats Two Indian vaccine makers and an Oxford University lab are reportedly among the latest targets of hackers apparently seeking to steal COVID-19 research data

223
223

Researchers Disclose More Malware Used in SolarWinds Hack

Data Breach Today

Microsoft, FireEye Find Additional Payloads Used During Supply Chain Attack Researchers with Microsoft and FireEye are disclosing additional malware used by the hacking group that targeted SolarWinds in December.

203
203

Chinese Attack Tool Gains Gmail Access

Data Breach Today

Campaign Targets Tibetan Organizations Proofpoint reports that Chinese state-sponsored hackers are using a new customized malicious Mozilla Firefox browser extension that facilitates access and control of victims’ Gmail accounts. So far, the hackers are targeting Tibetan organizations

Access 231

How $100M in Jobless Claims Went to Inmates

Krebs on Security

The U.S. Labor Department’s inspector general said this week that roughly $100 million in fraudulent unemployment insurance claims were paid in 2020 to criminals who are already in jail.

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

The new DevSecOps team is up and running, and you feel ready to take on rising security threats while delivering quality software updates. But that leaves just one question: how do you monitor your new program as effectively and efficiently as possible? Join Shannon Lietz, Director of DevsecOps at Intuit, and award-winning innovator, to learn the answers to these questions so you can lead your DevSecOps team to the top!

DHS to Provide $25 Million More for Cybersecurity Grants

Data Breach Today

CISA May Launch Other Grants as Well The U.S. Department of Homeland Security will provide an additional $25 million in grants to state and local cybersecurity preparedness programs with a particular focus on combatting ransomware, Secretary Alejandro Mayorkas announced Thursday

Lazarus Hits Defense Firms with ThreatNeedle Malware

Data Breach Today

226
226

Patient Files Dumped on Darknet Site After Hacking Incidents

Data Breach Today

Data Appears to Come From 2 Healthcare Organizations in Florida, Texas The Conti cybercrime gang has reportedly leaked sensitive patient data, as well as employee records, on a darknet site following recent hacker attacks on a two healthcare organizations in Florida and Texas

260
260

Microsoft: Chinese Cyberspies Used 4 Exchange Server Flaws to Plunder Emails

Krebs on Security

Microsoft Corp. today released software updates to plug four security holes that attackers have been using to plunder email communications at companies that use its Exchange Server products.

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

Lesson From SolarWinds Attack: It's Time to Beef Up IAM

Data Breach Today

NIST, CISA Call for Rethinking Security in Wake of Supply Chain Attack The SolarWinds supply chain attack should prompt federal agencies and others to rethink how they approach security issues - especially identity and access management, according to a breakdown of the attack presented this week by NIST and CISA.

IT 194

Ransomware Attack's Economic Impact: $67 Million

Data Breach Today

Universal Health Services' Financial Statement Spells Out the Effects In an eye-opening look at the cost burden of a ransomware attack, Universal Health Services reports that an incident last September had a $67 million economic impact - citing, for example, the need to divert patients to competing facilities for urgent care.

Accellion Attack Involved Extensive Reverse Engineering

Data Breach Today

Sophisticated Attackers Took the Time to Master a 20-Year-Old Product, FireEye Says Using a nearly 20-year-old file-transfer product: What could go wrong?

197
197

Microsoft Patches Windows Remote Code Flaw

Data Breach Today

The Flaw in Windows Graphics Component Can Enable Web-Based Attacks Microsoft has patched a critical vulnerability in Windows that can be exploited by tricking users to visit websites that use a malicious font. The flaw was found by Google's Project Zero bug-hunting team

217
217

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

House SolarWinds Hearing Focuses on Updating Cyber Laws

Data Breach Today

Lawmakers and Witnesses See Expanded Role for CISA Following Attack A pair of U.S. House committees held their first public hearings into the SolarWinds attack, with lawmakers and witnesses offering support for expanding federal cybersecurity laws to address the security failures.

Nigerian Gets 10-Year Sentence for BEC Scam

Data Breach Today

Prosecutors: Crime Operation Extorted $11 Million A Nigerian national has been sentenced to 10 years in prison after pleading guilty to taking part in a business email compromise operation that extorted $11 million from its victims, according to the U.S. Department of Justice

IT 237

Researchers Show How Digitally Signed PDFs Can Be Manipulated

Data Breach Today

Attackers Could Use Tactic to Insert Malicious Content Hackers could manipulate certain digitally signed PDF documents to add malicious content, according to a study by researchers at Germany's Ruhr University of Bochum

217
217

Mexican Politician Removed Over Alleged Ties to Romanian ATM Skimmer Gang

Krebs on Security

The leader of Mexico’s Green Party has been removed from office following allegations that he received money from a Romanian ATM skimmer gang that stole hundreds of millions of dollars from tourists visiting Mexico’s top tourist destinations over the past five years.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

White House Preparing 'Executive Action' After SolarWinds Attack

Data Breach Today

Deputy National Security Adviser Anne Neuberger Offers an Update on Investigation In an update on the investigation into the SolarWinds supply chain attack, Deputy National Security Adviser Anne Neuberger said the Biden administration is preparing "executive action" to address security shortcomings that have come to light.

New Malicious Adware Exploits Apple M1 Chip

Data Breach Today

GoSearch22 is an Off-Shoot of macOS-Targeting Pirrit Adware A security researcher has uncovered what is believed to be the first-ever malware variant that can be successfully executed in Apple's M1 chips, its latest central processor unit for Mac computers

Checkout Skimmers Powered by Chip Cards

Krebs on Security

Easily the most sophisticated skimming devices made for hacking terminals at retail self-checkout lanes are a new breed of PIN pad overlay combined with a flexible, paper-thin device that fits inside the terminal’s chip reader slot. What enables these skimmers to be so slim?

Retail 220

What’s most interesting about the Florida water system hack? That we heard about it at all.

Krebs on Security

Stories about computer security tend to go viral when they bridge the vast divide between geeks and luddites, and this week’s news about a hacker who tried to poison a Florida town’s water supply was understandably front-page material.

IT 246

This Buyer’s Guide Will Help you Choose the Best Graph Database

Selecting a graph database is an important decision that can shape the success of your organization. This guide is intended to assist your buying decision with side-by-side comparisons of graph databases from Amazon, DataStax, Neo4j, and TigerGraph.