Originally Posted On: techrepublic.com Experts predict companies will continue to hire cybersecurity, AI, and developer roles throughout the year. The tech jobs landscape of 2019 will likely look largely the same as it did in 2018, with roles in software development, cybersecurity, and data science dominating across industries. “Emerging technologies will be key catalysts for […]
https://ca-cyberhub.org/wp-content/uploads/2018/12/istock-1003336632.jpg578770Lara Wrzosek/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngLara Wrzosek2018-12-09 16:15:472018-12-09 16:30:30The 10 most in-demand tech jobs of 2019
Originally Posted On: singularityhub.com We tend to compartmentalize our understanding of the world into “subjects.” From a very young age, we are misled to believe that science is separate from art, which is separate from history, which is separate from economics, and so on. However, a true understanding of the world and our place in it […]
https://ca-cyberhub.org/wp-content/uploads/2018/11/dark-nebula-stars-space-elements_shutterstock_1183782385.jpg6011068Lara Wrzosek/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngLara Wrzosek2018-11-12 13:34:312018-11-06 20:36:505 Projects That Show How STEAM Can Shape the Future
Originally Posted On: threatpost.com Called BleedingBit, this vulnerability impacts wireless networks used in a large percentage of enterprise companies. UPDATE Two zero-day vulnerabilities in Bluetooth Low-Energy chips made by Texas Instruments (and used in millions of wireless access points) open corporate networks to crippling stealth attacks. Adversaries can exploit the bugs by simply being approximately 100 […]
https://ca-cyberhub.org/wp-content/uploads/2018/11/Wireless_Bluetooth_BLE.jpg418700Lara Wrzosek/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngLara Wrzosek2018-11-10 13:32:012018-11-06 20:34:17Two Zero-Day Bugs Open Millions of Wireless Access Points to Attack
Originally Posted On: techrepublic.com The explosion of data in consumer and business spaces can place our productivity at risk. There are ways you can resist drowning in data. The pace of data creation steadily increases as technology becomes more and more ingrained in people’s lives and continues to evolve. According to Forbes.com last May, “there are […]
Originally Posted On: informationweek.com Agile, DevOps, Continuous Delivery and Continuous Development all help improve software delivery speed. However, as more applications and software development tools include AI, might software developers be trading trust and safety for speed? The software delivery cadence has continued to accelerate with the rise of Agile, DevOps and continuous processes including Continuous […]
Originally Posted On: blog.360totalsecurity.com Background On October 18, 2018, 360 Threat Intelligence Center captured for the first time an example of an attack using the Excel 4.0 macro to spread the Imminent Monitor remote control Trojan. Only 10 days after the security researchers of Outflank, a foreign security vendor, publicly used Excel 4.0 macros to execute […]
https://ca-cyberhub.org/wp-content/uploads/2018/11/180328_blog_windows.png6301200Lara Wrzosek/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngLara Wrzosek2018-11-04 20:22:232018-11-06 20:24:31The analysis of the attack which uses Excel 4.0 macro to avoid antivirus software detection
From autonomous things and blockchain to quantum computing; how many of these technologies are you ready for? This article originally appeared on ZDNet. Tech analyst firm Gartner has compiled a list of the top ten strategic technology trends that organisations need to explore in 2019. According to Garner, these technologies have substantial disruptive potential and are […]
https://ca-cyberhub.org/wp-content/uploads/2018/11/data.jpg578770Lara Wrzosek/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngLara Wrzosek2018-11-02 20:21:122018-11-06 20:22:17Here are the 10 top tech trends you need to understand right now
Originally Posted On: aitp.org As the lead for information security at Chicago Public Schools in 2013, Edward Marchewka wanted a way to measure how well the nation’s third largest public school district was doing at protecting its sensitive data. Marchewka couldn’t find a model he liked, so he built one. It didn’t take long for him to […]
https://ca-cyberhub.org/wp-content/uploads/2018/11/accountant-accounting-bankbook-948887.jpg15052500Lara Wrzosek/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngLara Wrzosek2018-10-31 20:18:512018-11-06 20:20:334 THINGS TO CONSIDER BEFORE STARTING AN IT CONSULTING BUSINESS
Originally Posted On: techrepublic.com Three jobs completely new to the IT industry will be data trash engineer, virtual identity defender, and voice UX designer, according to Cognizant. With technology flooding the enterprise, many people fear the emergence of tech will take over their jobs. However, tech like artificial intelligence (AI) and machine learning will actually create more […]
https://ca-cyberhub.org/wp-content/uploads/2018/11/new-jobs.jpg577770Lara Wrzosek/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngLara Wrzosek2018-10-29 20:13:442018-11-06 20:18:4121 new tech jobs that will define the next decade of IT work
Originally Posted On: informationweek.com When hiring gets tough, IT leaders get strategic. Here’s how successful organizations seize the experts their competitors’ only wish they could land. The technology industry’s unemployment rate is well below the national average, forcing companies to compete aggressively for top talent. When presented with a range of recruitment strategies by a recent Robert […]
https://ca-cyberhub.org/wp-content/uploads/2018/10/computer-desktop-developer-113850.jpg38405760cpadmin/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngcpadmin2018-10-23 17:47:432018-10-25 20:23:34CompTIA IT Fundamentals+ (ITF+) is an introduction to basic IT knowledge and skills
People make a lot of excuses for avoiding cybersecurity assessments and getting third party help to build effective security teams. “My IT guy does that for me” and “It’s too expensive” are automatic, followed by “We’re just a small business, our data doesn’t matter.”
As cybersecurity has become more complex, traditional methods do not account for the wide range of issues related to securing corporate data and handling privacy concerns, according to new research report from CompTIA.
In the association’s report titled 2018 Trends in Cybersecurity: Building Effective Cybersecurity Teams, barely a quarter of those surveyed are satisfied with their current security posture and only 26 percent have a dedicated security team. On one hand, companies complain that good cybersecurity is too time consuming and not in the budget. At the same time, decision makers are scared to death of developing and executing a good cybersecurity plan and make lots of excuses to avoid it.
https://ca-cyberhub.org/wp-content/uploads/2018/10/cybersecurity-excuses-blog-entry.gif300375cpadmin/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngcpadmin2018-10-20 18:52:242018-10-25 20:23:34Cybersecurity Excuses You Hear All the Time — and the Best Ways to Respond
The survey polled 1,900 technology professionals employed in the United States. Half of the respondents worked in management roles, and half held staff positions. Forty-five percent were from enterprises with more than 1,000 employees, and they represented a wide range of industries.
Both managers and IT staffers saw their pay rise by $5,000. For staff, median total compensation rose from $85,000 in last year to $90,000 this year. That’s a significant increase, but the end result still trails the all-time high of $92,000 set in 2014.
https://ca-cyberhub.org/wp-content/uploads/2018/10/00SalaryIntro.jpg326489cpadmin/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngcpadmin2018-10-20 18:48:322018-10-25 20:23:34IT Salary Survey 2018: How Much Do IT Pros Earn?
Blockchain, AI, facial recognition? Here are Gartner’s top strategic predictions for 2019 and beyond, delivered during the Gartner Symposium/ITExpo.
Deciding which projects to invest in right away and what projects should wait a little longer is one of the big tasks corporate boards and CIOs are focused on right now during IT budget season. To help decision makers with the big task at hand, Gartner Distinguished VP and Analyst Daryl Plummer announced to a packed house Gartner’s Top Strategic Predictions for 2019 and Beyond during Gartner Symposium/ITExpo yestereday in Orlando.
“When we look at predicting the future, we typically have an 80 to 85% accuracy rate across all our predictions, and one of the things that I always say is that that’s not good,” Plummer said. “I’d be happier if our accuracy rate was 60% because I say if you aren’t wrong you’re not trying hard enough. I just found out one of our reports dropped to a 30% accuracy rate. I wasn’t as happy about that as I thought I might be.”
https://ca-cyberhub.org/wp-content/uploads/2018/10/Predictions_Gartner2018.jpg367489cpadmin/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngcpadmin2018-10-20 18:41:502018-10-25 20:23:3410 Top Strategic Predictions for 2019
San Diego is uniquely positioned to be a leader in cybersecurity — not only in California but in the United States and even the world. The city’s proximity to the U.S. military and some of the world’s biggest technology companies has created more than 7,500 cybersecurity jobs.
RADM (Ret.) Kenneth Slaght is at the forefront of growing them and establishing San Diego’s standing in the process. Slaght is Chair and President of the San Diego Cyber Center of Excellence (CCOE), an organization established in 2014 to address the region’s cybersecurity industry needs.
“Companies in the region like Qualcomm and FICO said workforce was the biggest issue they faced,” Slaght said. “There are more than 100 companies doing cyber work in this region and they can’t find the people to fill their open positions.”
Thanks to the efforts of Slaght and his team, and the partnerships they’ve made with education and industry, the CCOE is well on its way to tackling that problem and building a robust cybersecurity workforce. The organization maintains a job board of hundreds of open positions and created a career map that shows education and certification pathways to join this in-demand industry.
“On any given day, there are 80-100 job openings here in the region,” Slaght said. “The region’s colleges are just meeting or barely meeting that demand without accounting for the fact that we lose many of our graduates to places like Silicon Valley and Washington, D.C.”
While the region’s universities and colleges graduate over 3,000 computer science and engineering students each year, the demand for qualified cyber workers continues to increase across all sectors.
https://ca-cyberhub.org/wp-content/uploads/2018/10/Cyber_Hero_Kenneth_Slaght.jpg1039775cpadmin/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngcpadmin2018-10-16 18:36:122018-11-05 02:56:12Cyber Hero Kenneth Slaght: Making San Diego a Cyber Leader
FOR IMMEDIATE RELEASE Contact: Steve Wright Information Communication Technologies-Digital Media Sector Navigator California Community Colleges [email protected]
ROCKLIN, Calif. — There’s never been a better time to enter the IT workforce, as thousands of high paying jobs remain unfilled across California. A new initiative at California’s Community College is making it easier than ever for people with little or no technical experience to find a pathway toward one of those jobs in just a few months.
The IT Technician Pathway, offered at 22 California community colleges, is a series of four sets of courses designed to take students from computer sales to help desk support to more specialized fields like networking and cybersecurity. Each group of courses in the pathway corresponds to industry certifications that are essential for employment in any IT job.
https://ca-cyberhub.org/wp-content/uploads/2018/10/ai-codes-coding-247791.jpg14302604cpadmin/wp-content/uploads/2018/10/cac_cmyk_logo_wordmark-01.pngcpadmin2018-10-16 18:29:102018-10-25 20:23:34IT Technician Pathway Leads to High-Paying Jobs in California