article thumbnail

Do We Have a Cybersecurity Skills Gap?

Thales Cloud Protection & Licensing

His approach uses the philosophy that is used in the military, whereby an untrained individual is placed into positions based on aptitude. If corporations looked internally, they could find people who demonstrate a proclivity towards security, and those people could be trained to be part of the security workforce.

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today. Observes Salvi: “We’ve gone to a stage where the Chief Information Security Officer has become a well-defined, mainstream role. Related: Why U.S.

Security 261
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list

Security Affairs

Ukraine is recruiting a volunteer IT army of cyber security experts and white hat hackers to launch cyberattacks on a list of Russian entities. Ukraine’s Minister for Digital Transformation Mykhaylo Fedorov called to action against Russia attempting to create an “IT Army” to launch a massive offensive against Russia.

IT 104
article thumbnail

5G – The Future of Security and Privacy in Smart Cities

Security Affairs

5G is already becoming standard in cities, and as cities become dependent on the digital transformation, a lot has to be put together into security, with cybersecurity as the priority. Building a Safer Smart City.

Privacy 51
article thumbnail

Five recommendations for federal agencies to use the cloud to accelerate modernization

IBM Big Data Hub

In response to the COVID-19 crisis, many federal agencies kicked their digital transformations into high gear to help enhance public services, embrace a remote workforce and better secure data with trust and transparency. Edge computing is a strategy for securely extending a digital environment out to the user.

Cloud 57
article thumbnail

A partnership perspective on government cloud security

IBM Big Data Hub

In response to the COVID-19 crisis, many federal agencies kicked their digital transformations into high gear to help enhance public services, embrace a remote workforce and better secure data with trust and transparency. Edge computing is a strategy for securely extending a digital environment out to the user.

Cloud 52
article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

I’m talking about cybercrime unicorns, talking the fog of cyberwar among nation states, and about a new book that I think will be on the shelves of every information security professional later this summer. Vamosi: The slogan of the RSA Conference is “Where the World Talks Security,” and, in general.