ITPro.TV

The Ultimate Guide to IT Certifications

ITPro.TV

A complete guide to IT certifications The tech industry is rapidly expanding, and the demand for IT skills in the workforce is growing. A career in IT can be rewarding and has longevity. In order to thrive in a tech career, it is important to stay up–to–date with the ever-changing world of technology by earning certifications.

IT 63

What is going on over at Microsoft? AZ – 100, 101, and 103 explained

ITPro.TV

Last September, at Microsoft Ignite in Orlando, Microsoft showcased several new role-based certifications. As an early adopter, I naturally was excited to learn about the new certifications and began researching and preparing to take the AZ-100 and AZ-101 certification exams. I have already sat and passed the AZ-100 exam, and I have begun preparing to … Continue reading What is going on over at Microsoft?

IT 63
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The New Next Level Certifications from Cisco: An Overview

ITPro.TV

As you may have heard, this week, Cisco announced their new Next Level IT certifications during the Cisco Live event. In this blog, resident Cisco and networking edutainer Ronnie Wong walks you through what’s new, what to study now, and what the announcement means to you.

IT 58

4 Easy Steps to Break into the IT Field

ITPro.TV

So, you’ve been considering it for a while, and you’ve decided to take that leap of faith and break into the IT field. Great! Information technology is an ever-evolving field with numerous specializations that are in very high demand. According to research from Fosster, the top 10 most in-demand IT jobs all have salaries in the 6-figure range.

IT 55

Address the Challenges of Siloed Monitoring Tools

Companies frequently experience monitoring tool sprawl. Find out why monitoring tool sprawl occurs, why it’s a problem for businesses, and the positive business impacts of monitoring tool consolidation.

Who Needs CompTIA IT Fundamentals+ Certification?

ITPro.TV

What is CompTIA IT Fundamentals+? CompTIA IT Fundamentals+ is a certification designed to help aspiring IT professionals decide if a career in IT is right for them. It helps develop a broader understanding of IT, and is the only single certification that encompasses all areas of IT foundations. This makes it the ideal certification for … Continue reading Who Needs CompTIA IT Fundamentals+ Certification? → The post Who Needs CompTIA IT Fundamentals+ Certification?

IT 48

Why now is the right time to start working in cybersecurity

ITPro.TV

IT Security in Today’s Environment If the constant, news about ransomware attacks and security breaches is not enough to highlight the critical importance of cybersecurity roles today, nothing will. The world is full of bad actors intent on doing harm to businesses, governments, and individuals.

5 Security Certifications That Will Boost Your IT Career

ITPro.TV

If you have been on the fence about whether or not a security certification would benefit your IT career, the short answer is – yes. Putting in the time and effort to earn an in-demand certification can significantly boost your salary. Also, it may open doors to a wealth of new opportunities. So, how do … Continue reading 5 Security Certifications That Will Boost Your IT Career → The post 5 Security Certifications That Will Boost Your IT Career appeared first on ITProTV Blog.

IT 40

How Cyber Safe is Your Drinking Water Supply?

Krebs on Security

Lawsuits Allege Colonial Pipeline Had Inadequate Cybersecurity

Data Breach Today

Gas Stations as Well as Consumers Seek Damages Colonial Pipeline Co. now faces at least two lawsuits seeking class action status in the aftermath of a ransomware attack in May that led the firm to shut down the operations of a 5,500-mile pipeline for nearly a week

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

How Does One Get Hired by a Top Cybercrime Gang?

Krebs on Security

The U.S. Department of Justice (DOJ) last week announced the arrest of a 55-year-old Latvian woman who’s alleged to have worked as a programmer for Trickbot , a malware-as-a-service platform responsible for infecting millions of computers and seeding many of those systems with ransomware.

Profiles in Leadership: Mario Demarillas of Exceture

Data Breach Today

CISO Discusses Changing Security Culture in Organizations Mario Demarillas, CISO and head of IT consulting and software engineering at Exceture, in the Philippines, strikes a balance between securing his organization and its business offering in security

EU Proposes Joint Cybersecurity Unit

Data Breach Today

Agency Would Help Member States Respond to Cyberattacks The European Commission has proposed creating a Joint Cyber Unit to help EU member states respond to and prevent cyberattacks, especially those involving ransomware. The goal is for the unit to begin operations by the end of next year

How to Tell a Job Offer from an ID Theft Trap

Krebs on Security

One of the oldest scams around — the fake job interview that seeks only to harvest your personal and financial data — is on the rise, the FBI warns.

IT 285

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized

Krebs on Security

The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills.

A Closer Look at the DarkSide Ransomware Gang

Krebs on Security

The FBI confirmed this week that a relatively new ransomware group known as DarkSide is responsible for an attack that caused Colonial Pipeline to shut down 5,550 miles of pipe , stranding countless barrels of gasoline, diesel and jet fuel on the Gulf Coast.

First American Financial's SEC Breach Settlement: $488,000

Data Breach Today

SEC: Executives Left in Dark About Vulnerability in File-Sharing System Title insurance company First American Financial Corp. will pay the SEC a $488,000 penalty as a result of a data breach revealed two years ago.

N. Korean Attackers Suspected in S. Korean Nuclear Agency Hack

Data Breach Today

Attackers Exploited VPN Flaw at Nuclear Agency The Korea Atomic Energy Research Institute, a South Korean organization, confirms it was recently hacked, apparently by a North Korean group that exploited a VPN vulnerability

IT 188

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

US Seizes Domains of Websites Linked to Iran, Iraq

Data Breach Today

Justice Department Alleges Sites Target US With Disinformation Campaigns The U.S. has seized the domains of 36 websites linked with Iran and Iraq for allegedly publishing disinformation and running malicious influencing campaigns targeting Americans.

171
171

Senators Draft a Federal Breach Notification Bill

Data Breach Today

201
201

Microsoft Patches Six Zero-Day Security Holes

Krebs on Security

Microsoft today released another round of security updates for Windows operating systems and supported software, including fixes for six zero-day bugs that malicious hackers already are exploiting in active attacks.

Lawmakers Unveil Cybersecurity Legislation

Data Breach Today

Bills Address Criminal Penalties, School District Protection and More Republican and Democratic lawmakers have recently introduced several cybersecurity-related bills seeking to address issues ranging from imposing tougher penalties for cybercriminals to improving protection of school districts

What E-Commerce Performance Metrics Are CTOs Monitoring?

In this eBook, Danny Miles, CTO of Dollar Shave Club, reveals an efficient framework for thinking about and prioritizing the performance metrics that matter most to him, providing a blueprint for fellow e-commerce CTOs to follow as they evaluate their own business.

Biden Warns Putin of Cyber Retaliation

Data Breach Today

Wants 16 Critical Infrastructure Entities Off-Limits to Attack At their Geneva summit meeting Wednesday, U.S. President Joe Biden told Russian President Vladimir Putin that if Russia continued to wage cyberattacks against the U.S., it would face retaliation

IT 205

CISA Shifting Einstein Detection System Deeper Into Networks

Data Breach Today

Move Away From Perimeter Designed to Help Agencies Battle Supply Chain Attacks CISA is moving its Einstein intrusion detection system deeper into federal networks in an effort to better detect supply chain attacks after its failure to detect the espionage campaign that targeted SolarWinds and its customers, including federal agencies.

IT 174

How Cyber Sleuths Cracked an ATM Shimmer Gang

Krebs on Security

In 2015, police departments worldwide started finding ATMs compromised with advanced new “shimming” devices made to steal data from chip card transactions.

Try This One Weird Trick Russian Hackers Hate

Krebs on Security

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Recycle Your Phone, Sure, But Maybe Not Your Number

Krebs on Security

Many online services allow users to reset their passwords by clicking a link sent via SMS, and this unfortunately widespread practice has turned mobile phone numbers into de facto identity documents.

Union Benefits Administrator Says Data Deleted in Hack

Data Breach Today

Service Employees International Union 775 Benefits Group: PII and PHI Deleted A Seattle-based benefits administrator for unionized home healthcare and nursing home workers has reported a hacking incident affecting 140,000 individuals that involved deleting certain data

205
205

Using Fake Reviews to Find Dangerous Extensions

Krebs on Security

Fake, positive reviews have infiltrated nearly every corner of life online these days, confusing consumers while offering an unwelcome advantage to fraudsters and sub-par products everywhere. Happily, identifying and tracking these fake reviewer accounts is often the easiest way to spot scams.

McDonald's Breach Exposes Korean, Taiwanese Customer Data

Data Breach Today

Company Says Phone Numbers, Delivery and Email Addresses Exposed Fast-food giant McDonald's is acknowledging a data breach that affected some customer and company data from its locations in Korea and Taiwan. Phone numbers, delivery and email addresses were exposed.

9 Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

NATO Endorses Cybersecurity Defense Policy

Data Breach Today

Agreement Comes in Advance of Biden Meeting With Putin on Wednesday The U.S. and its NATO allies endorsed a new cybersecurity defense policy during President Biden's visit this week with member states in Brussels.

Cyberium Domain Targets Tenda Routers in Botnet Campaign

Data Breach Today

AT&T Alien Labs: Hackers Used Mirai Variant MooBot Malware hosting domain Cyberium has spread multiple Mirai variants, including one that targeted vulnerable Tenda routers as part of a botnet campaign, AT&T Alien Labs reports

190
190

CISA: Firewall Rules Could Have Blunted SolarWinds Malware

Data Breach Today

Agency Says Blocking Outgoing Connections From Orion Would Have Stopped Malware Federal agencies could have prevented follow-on attacks after the SolarWinds supply chain attack by using recommended firewall configurations, but this step isn't always feasible, the Cybersecurity and Infrastructure Security Agency says.

Whistleblower: Ubiquiti Breach “Catastrophic”

Krebs on Security

On Jan. 11, Ubiquiti Inc. NYSE:UI] — a major vendor of cloud-enabled Internet of Things (IoT) devices such as routers, network video recorders and security cameras — disclosed that a breach involving a third-party cloud provider had exposed customer account credentials.

Cloud 286

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. However, there’s no team better suited to lead that charge than the marketing department.