Cyber News

Originally Posted On: bizjournals.com Hack attacks are evolving all the time, but 2019 will be a breakout year for a number of new and emerging attacks. While many businesses today still struggle with run-of-the-mill threats like phishing and un-patched software, they need to brace themselves for a wave of sophisticated hacks which will rely on new […]

Originally Posted On: forbes.com How many times have you endured a dry-as-dust PowerPoint presentation or clicked through a tired e-learning course only to realize, despite hours of ‘teaching,’ you remember virtually nothing? It’s easy to blame yourself when this happens; you may feel guilty or even harbor doubts about your ability to retain knowledge. Don’t. There’s […]

Kaspersky Lab’s found evidence that a small spyware government contractor sells iOS malware, showing it may not be as rare as some people think. Originally Posted on: motherboard.vice.com Thanks to a combination of tight controls and innovative security features, Apple has made the iPhone perhaps the most secure consumer device in the world. But nothing is […]

Originally Posted On: techrepublic.com Experts predict companies will continue to hire cybersecurity, AI, and developer roles throughout the year. The tech jobs landscape of 2019 will likely look largely the same as it did in 2018, with roles in software development, cybersecurity, and data science dominating across industries. “Emerging technologies will be key catalysts for […]

Originally Posted On: singularityhub.com We tend to compartmentalize our understanding of the world into “subjects.” From a very young age, we are misled to believe that science is separate from art, which is separate from history, which is separate from economics, and so on. However, a true understanding of the world and our place in it […]

Originally Posted On: threatpost.com Called BleedingBit, this vulnerability impacts wireless networks used in a large percentage of enterprise companies. UPDATE Two zero-day vulnerabilities in Bluetooth Low-Energy chips made by Texas Instruments (and used in millions of wireless access points) open corporate networks to crippling stealth attacks. Adversaries can exploit the bugs by simply being approximately 100 […]

Originally Posted On: techrepublic.com The explosion of data in consumer and business spaces can place our productivity at risk. There are ways you can resist drowning in data. The pace of data creation steadily increases as technology becomes more and more ingrained in people’s lives and continues to evolve. According to Forbes.com last May, “there are […]

Originally Posted On: informationweek.com Agile, DevOps, Continuous Delivery and Continuous Development all help improve software delivery speed. However, as more applications and software development tools include AI, might software developers be trading trust and safety for speed? The software delivery cadence has continued to accelerate with the rise of Agile, DevOps and continuous processes including Continuous […]

Originally Posted On: blog.360totalsecurity.com Background On October 18, 2018, 360 Threat Intelligence Center captured for the first time an example of an attack using the Excel 4.0 macro to spread the Imminent Monitor remote control Trojan. Only 10 days after the security researchers of Outflank, a foreign security vendor, publicly used Excel 4.0 macros to execute […]

From autonomous things and blockchain to quantum computing; how many of these technologies are you ready for? This article originally appeared on ZDNet.  Tech analyst firm Gartner has compiled a list of the top ten strategic technology trends that organisations need to explore in 2019. According to Garner, these technologies have substantial disruptive potential and are […]

Originally Posted On: aitp.org As the lead for information security at Chicago Public Schools in 2013, Edward Marchewka wanted a way to measure how well the nation’s third largest public school district was doing at protecting its sensitive data. Marchewka couldn’t find a model he liked, so he built one. It didn’t take long for him to […]

Originally Posted On: techrepublic.com Three jobs completely new to the IT industry will be data trash engineer, virtual identity defender, and voice UX designer, according to Cognizant. With technology flooding the enterprise, many people fear the emergence of tech will  take over their jobs. However, tech like artificial intelligence (AI) and machine learning will actually create more […]

Originally Posted On: informationweek.com When hiring gets tough, IT leaders get strategic. Here’s how successful organizations seize the experts their competitors’ only wish they could land. The technology industry’s unemployment rate is well below the national average, forcing companies to compete aggressively for top talent. When presented with a range of recruitment strategies by a recent Robert […]

computer desktop developer 113850

Originally Posted On: certification.comptia.org

Why is it different?

CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT.

  • CompTIA ITF+ is the only pre-career certification that helps students or career changers determine if they have a competency for information technology and if it is the right career path for them.
  • ITF+ is the only single certification that covers all areas of IT foundations, creating a broader understanding of IT making it ideal for non-technical professionals.
  • CompTIA ITF+ establishes an IT education framework for students in middle school and high school.
cybersecurity excuses blog entry

Originally Posted on: comptia.org

People make a lot of excuses for avoiding cybersecurity assessments and getting third party help to build effective security teams. “My IT guy does that for me” and “It’s too expensive” are automatic, followed by “We’re just a small business, our data doesn’t matter.” 

As cybersecurity has become more complex, traditional methods do not account for the wide range of issues related to securing corporate data and handling privacy concerns, according to new research report from CompTIA.

In the association’s report titled 2018 Trends in Cybersecurity: Building Effective Cybersecurity Teams, barely a quarter of those surveyed are satisfied with their current security posture and only 26 percent have a dedicated security team. On one hand, companies complain that good cybersecurity is too time consuming and not in the budget. At the same time, decision makers are scared to death of developing and executing a good cybersecurity plan and make lots of excuses to avoid it. 

00SalaryIntro

Originally Posted on: informationweek.com

Compare your salary to the median pay for 12 popular IT job titles, from the help desk to the C-suite.

Good news for IT professionals: Salaries are on the rise.

In the 2018 Interop ITX/Information Week Salary Survey, unveiled this week, median total compensation climbed 5% from $100,000 per year in 2017 to $105,000 in 2018.

The survey polled 1,900 technology professionals employed in the United States. Half of the respondents worked in management roles, and half held staff positions. Forty-five percent were from enterprises with more than 1,000 employees, and they represented a wide range of industries.

Both managers and IT staffers saw their pay rise by $5,000. For staff, median total compensation rose from $85,000 in last year to $90,000 this year. That’s a significant increase, but the end result still trails the all-time high of $92,000 set in 2014.