article thumbnail

Do We Have a Cybersecurity Skills Gap?

Thales Cloud Protection & Licensing

Do We Have a Cybersecurity Skills Gap? The demand for cybersecurity skills has been on the rise for some considerable time, but in so many cases, supply has not kept up with demand. His approach uses the philosophy that is used in the military, whereby an untrained individual is placed into positions based on aptitude.

article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

In this episode of The Security Ledger Podcast (#255) host Paul Roberts interviews Niels Provos of Lacework about his mission to use EDM to teach people about cybersecurity. Software is now central to the operation of our economy – as digital transformation washes over every industry. Click the icon below to listen.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

cybersecurity policy needs to match societal values CISOs must preserve and protect their companies in a fast-changing business environment at a time when their organizations are under heavy bombardment. CISOs’ fundamental challenge Continual clear communication is needed to cut through the noise and confusion of digital transformation.

Security 309
article thumbnail

As 2-factor authentication falls short, ‘adaptive multi-factor authentication’ goes mainstream

The Last Watchdog

Silverfort has introduced new technology that is designed to help corporations address unprecedented authentication exposures spinning out of ‘digital transformation.’. This is what digital transformation is all about.

article thumbnail

Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list

Security Affairs

Ukraine’s Minister for Digital Transformation Mykhaylo Fedorov called to action against Russia attempting to create an “IT Army” to launch a massive offensive against Russia. The post was written by Yegor Aushev, co-founder of the Ukrainian cybersecurity firm Cyber Unit Technologies. We are creating an IT army.

IT 104
article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

Related: Ground zero for cybersecurity research Having covered the cybersecurity industry for the past 15 years, it’s clear to me that there are two primary reasons. One is the intensely competitive nature of organizations, and the other has to do with the escalating digitalization of commerce.

Big data 153
article thumbnail

7 Types of Penetration Testing: Guide to Pentest Methods & Types

eSecurity Planet

Finally, as companies embark on digital transformation and modernization, threats to IoT, sensors, cameras, mobile devices, and other endpoints intensify. Hackers will try to access critical assets through any of these new points, and the expansion of the digital surface works in their favor.

Cloud 122