article thumbnail

GUEST ESSAY: The case for using augmented reality (AR) and virtual reality (VR) to boost training

The Last Watchdog

Augmented reality (AR) and virtual reality (VR) technologies provide intriguing opportunities for immersive and interactive experiences in cybersecurity training. Related: GenAI’ impact on DevSecOps Here’s how these technologies can bridge learning gaps in cybersecurity awareness and enhance the overall training experience.

article thumbnail

GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

The Last Watchdog

User education: Regularly train employees on cybersecurity best practices, including recognizing phishing attempts and secure handling of sensitive information. Encrypt sensitive data and maintain regular, secure backups to ensure data integrity and availability, even in the event of system failures or cyber attacks.

Risk 265
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Get ready for change with IBM Cloud Training

IBM Big Data Hub

The IBM Center for Cloud Training has been busy creating and delivering training and certification programs that prepare you to work with the infrastructure and data that Cloud requires. The downloadable presentation includes the most frequently missed questions on the exam.

Cloud 73
article thumbnail

Manipulating Machine-Learning Systems through the Order of the Training Data

Schneier on Security

Yet another adversarial ML attack: Most deep neural networks are trained by stochastic gradient descent. Now “stochastic” is a fancy Greek word for “random”; it means that the training data are fed into the model in random order. So what happens if the bad guys can cause the order to be not random?

Paper 115
article thumbnail

Tips for Gamifying Your Cybersecurity Awareness Training Program

Security Affairs

These errors are not always entirely preventable, as some level of human error is inevitable, but proper training in cybersecurity awareness can greatly decrease the likelihood of human mistakes leading to data breaches. While cybersecurity awareness training can take many forms, most training programs are computer-based.

article thumbnail

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

Consider that PCI-DSS alone has over 250 complex requirements that include things like endpoint protection, password management, anti-virus, border security, data recovery and awareness training. Traditional channels for choosing the right security solutions are proving to be increasingly ineffective.

article thumbnail

NEW TECH: Circadence deploys ‘gamification’ training to shrink cybersecurity skills gap

The Last Watchdog

Related: The need for diversity in cybersecurity personnel One of the top innovators in the training space is Circadence ®. Even though game is in the name, gamification isn’t about turning a Power Point presentation into an interactive Angry Birds tournament. But what if that training looked more like the game Call of Duty?