National Cybersecurity Awareness Month
National Cybersecurity Awareness Month
Cyber Security jobs one of the fastest growing fields in the US
The U.S. Bureau of Labor predicts that cybersecurity jobs will increase 28% from 2016 to 2026, making it one of the fastest-growing fields.
Lawmakers introduce legislation to improve cyber workforce funding
Lawmakers in the House and Senate introduced legislation on Wednesday to improve the cybersecurity workforce by directing the Department of Labor to award grants that help create and expand cyber apprenticeship programs.
Indeed: Apple tops list for cybersecurity hiring
Apple is the No. 1 organization seeking cybersecurity experts, according to Indeed, which places the Federal Reserve Bank of New York, Patient First and Lockheed Martin in the top 10. Cybersecurity experts are in high demand worldwide, Indeed says, but a lack of availability is creating gaps within organizations.
Microsoft cybersecurity spending to surpass $1B annually
Microsoft will continue to spend more than $1 billion per year on cybersecurity research and development, said Vice President Bharat Shah. Investment in this area must increase, due to rising cloud use and attempted cyberattacks that have risen from 20,000 each week to between 600,000 and 700,000, Shah said.
Report: IT security teams lack staff, skills
More than half of businesses say it is a challenge to recruit qualified IT teams, and more than 60% say that some of their teams do not have specialized skills to prevent cyberattacks, a report by Osterman Research and Trustwave showed. Just 1 in 9 companies feel ready to face future cyberthreats, and most businesses recognize there is a skills gap in the sector that needs to be filled, the report found.
How organizations should tackle security shortages
The US has the world’s fourth-worst shortage of cybersecurity professionals, while the UK, Israel and Ireland also are struggling to fill cybersecurity positions, a study shows. Companies such as Atrion Communications are filling the gap by training young professionals, while Ron Temske of Logicalis recommends that organizations rely on automation during the shortage.
The importance of implementing companywide cybersecurity training
Corporations largely aren’t implementing cybersecurity awareness programs, while companies that are training aren’t offering refresher courses or following up, writes Tom DeSot. He recommends that companies implement a training program, then provide monthly updates to help avoid cyberbreaches.
Cybersecurity tops in-demand tech skills for next year
Businesses are looking for specific tech skills in their employees for the coming year, a Mondo survey shows. The most in-demand skills are cybersecurity, cloud computing and big data.Read more
Tips for improving enterprise cybersecurity
In a recap of a live session, columnist Emma Featherstone discusses what it takes to keep your business secure. Training your staff is key, as are things such as keeping your data as private as possible and using secure Wi-Fi networks.Read more
Report gives health care industry a “D” grade for cybersecurity
The health care industry received an overall “D” grade on Tenable’s global cybersecurity report card, getting failing grades in risk assessment scores for containerization platforms, mobile devices and development and operations environments. The report card gave the industry a “B-” for measuring security effectiveness, monitoring network risks continuously and communicating risks to executives and board members.Read more
Is AI the solution to fighting cyberattacks?
Artificial intelligence developers use deep learning to create devices that think like humans but process data at much faster speeds. This could be a potential solution against cyberattacks and could identify and remove the threats as they are created, Mitchelle Dover writes.Read more
Cybersecurity best practices for labs
Laboratories must ensure that their organizations have cybersecurity plans, since they have access to patients’ sensitive medical test results, demographic information and Social Security numbers, writes Sarah C.P. Williams. Experts recommend taking advantage of the Centers for Disease Control and Prevention’s discussion guide for health care cybersecurity, hiring outside experts to evaluate security and ensuring that all staff participate in cyberdefense preparation drills.Read more
Top 10 markets for IT jobs
IT job growth is projected to see healthy double-digit increases in markets across the country, but these growing markets are no longer confined to Silicon Valley. By the year 2025, Washington, D.C., Dallas-Fort Worth, Chicago, San Jose, Boston and Seattle are projected to see more than 15% growth in the number of employees working in IT positions. The new growth in these markets is fueling a healthy tech vibe. CompTIA’s IT Career News has more.
Global perspectives on cybersecurity
The evolving nature of technology has prompted a majority of organizations to change the way they approach security. CompTIA’s International Trends in Cybersecurity report examines the cybersecurity threats organizations face and the actions they are taking to counter those threats. Visit CompTIA Insights & Tools to download a free copy of the report.
New study examines tech issues and trends in human services
Dozens of human services leaders at the state government level provided insights on service delivery modernization; federal partnerships and interagency/state collaboration; workforce optimization; and emerging technology trends in a new study produced by CompTIA and the American Public Human Services Association. Visit the CompTIA Newsroom for more details.
Commission aims to boost cybersecurity workforce
People with cybersecurity skills are in short supply in the private and public sectors and demand for those skills is rising. A meeting this week of the presidential Commission on Enhancing National Cybersecurity sought to generate ideas on how to fill the gap.
Report: 3% of enterprises achieve cloud maturity
Only 3% of enterprises have achieved cloud maturity, netting approximately $1 million in savings and $3 million more in annual revenue for each cloud-based application, data from an IDC report indicate. Other companies struggle to fill a qualified workforce and outline their cloud-technology strategies as they make the shift.
ComputerWeekly.com (U.K.) (9/21)
FBI Agent to CHIME Attendees: The Cybersecurity Environment Is Becoming More Dangerous
The two biggest threats to health care data right now are cybercriminals and entities from other nations engaging in cyber-espionage, according to Timothy Wallach, Cyber Task Force supervisory special agent of the FBI Seattle Division, speaking at the CHIME/AEHIS LEAD Forum. Health care organizations can bolster their cybersecurity protections by applying strategies such as dual-factor authentication, password management, data backup and recovery plans, sensitive data encryption and social media management, Wallach said.
Healthcare Informatics online (8/15)
FCC chief sees cybersecurity as priority
Federal Communications Commission Chairman Tom Wheeler on Sunday spoke at the Aspen Institute Communication Policy Conference, discussing the stronger role the agency will play in protecting consumer privacy and establishing cybersecurity regulations. Wheeler noted that “[e]xisting in the midst of a network revolution is difficult.”
Broadcasting & Cable (8/15), Morning Consult (8/15)
Standard software ratings could improve security, reduce losses
A former hacker turned security consultant has warned US officials that lack of clarity over software ratings is reducing overall safety. A standard score for programs could give a clear indication of risk levels and better prepare users for potential attacks.
Carrier Management online (8/18)
Energy Dept. awaits approval for $34M in cybersecurity grants
The Energy Department has selected 12 cybersecurity projects to receive a total of $34 million in funding under its Cybersecurity of Energy Delivery Systems program. Congressional approval is still required to finalize the funding for the projects, which include work in areas such as threat reduction and supply chain protection.
The Hill (8/17)
Pentagon is aiming for 6,000 Cyber Command personnel by year-end
The Pentagon wants to fully staff its Cyber Command with 6,000 workers by the end of the year, but a highly competitive private market could mean it will have to wait. Defense One
Obama plans cybersecurity summit
President Barack Obama and officials from the FBI, Homeland Security Department and Secret Service will meet with executives from Wall Street, Silicon Valley and other industries Friday at Stanford University to discuss cybersecurity. The Wall Street Journal (tiered subscription model) (2/11)
Agency formed to detect cyberthreats
The Cyber Threat Intelligence Integration Center is a new agency being created by the Obama administration to prevent cyberattacks, as well as to coordinate strategy and intelligence to combat attacks once they occur. While the move is a result of serious hacks over the past year, including one involving Sony Pictures that was attributed to North Korea, critics say existing government agencies already have cyberthreat responsibilities. The Washington Post (tiered subscription model) (2/10)
Utah computers face more hacker attacks; location of NSA facility seen as reason
Utah state officials have seen what they describe as a sharp uptick in attempts to hack into state computers in the last two years, and they think it related to the NSA data center south of Salt Lake City. ABC News/The Associated Press (2/6)
Tips for prioritizing security tasks for business networks
The six-point security check that every organisation must keep on top of to minimise vulnerabilities. Information-Age.com (2/6)
Executives vie for control over security operations
Data breaches are sparking debate in some companies about the proper role of chief information officers and CEOs in the oversight of security personnel. Experts say CIOs should maintain close collaboration with chief information security officers, but that direct oversight should fall to CEOs with a clearer view of overall strategy. The Wall Street Journal (tiered subscription model)/CIO Journal blog
Anthem breach shows tension between encryption, access
Social Security numbers that were part of the Anthem data breach weren’t encrypted, a move that can improve security but also complicates data usage and sharing internally and with outside parties. Encryption isn’t a cure-all for companies, however. “At some point, that information is going to be used in an unencrypted state and if a hacker has access to it at that point, the information could be exposed,” said Adam Greene, formerly of the Department of Health and Human Services. The Indianapolis Star (tiered subscription model)
Insurer is sued over hacked database
Anthem is facing several class-action lawsuits after a cyberattack compromised the personal data of 80 million people. The California insurance commissioner and the HHS inspector general’s office are investigating. Modern Healthcare (tiered subscription model) (2/6)
IBM announces Identity Mixer security technology
IBM says its upcoming Identity Mixer technology can protect user privacy by limiting personal information given to third-party data collectors. The system will be available on a trial basis through IBM Bluemix, a platform-as-a-service. Network World/Layer 8 blog(1/28)
FTC points to privacy risks in Internet of Things products
The Federal Trade Commission issued a 71-page report Tuesday warning that connected devices that generate enormous amounts of personal data could invade consumers’ privacy and urging Internet of Things developers to take steps to prevent data leaks or invasions. A dissenting commissioner said the report did not include a needed cost-benefit analysis. PCWorld/IDG News Service(1/27), The New York Times (tiered subscription model)/Bits blog (1/27)
Pentagon targets Internet of Things with new cybersecurity approach
Protecting defense networks from a cyberattack is no longer just about securing computer systems because the Internet of Things makes everyday items such as refrigerators and jet engines a potential point of vulnerability, Defense Department officials say. Richard Hale says the Pentagon is adjusting by integrating cybersecurity into every aspect of its decision-making process. Breaking Defense (1/27)