Our latest cybersecurity news brought to you…
‘We have to find talent’ Cyber leaders push for skilled based hiring.
Bridging the Cyber Skills Gap: Advocating for Talent Over Tradition
As the demand for cybersecurity professionals skyrockets, leaders are reimagining hiring practices to tackle the shortage head-on. Embracing skills-based hiring, the Biden administration aims to fill nearly 100,000 federal IT jobs by next summer, prioritizing talent and abilities over traditional metrics like education and experience. However, the shift isn’t just about immediate vacancies; it’s about diversifying the talent pool to meet the evolving needs of the digital landscape. By investing in hands-on training and leveraging frameworks like the NICE Framework, organizations can identify and cultivate the specific skills needed to fortify cybersecurity defenses. Moreover, initiatives like Leidos’ degree equivalency matrix and federal cyber reskilling programs offer promising pathways for individuals with non-traditional backgrounds to enter the field. As leaders advocate for a skills-driven approach, the goal is clear: to unleash untapped potential and ensure a robust cybersecurity workforce for the challenges ahead. –Federal News Network, by Justin Doubleday
Cybersecurity Breach Exposes Vulnerable Individuals in Victoria
A recent cyberattack targeting a Victorian company has exposed personal data of thousands of victims of family violence and sexual assault, alongside about 60,000 students at Melbourne Polytechnic. Monash Health, Victoria’s largest health service, found itself ensnared in the breach, which compromised sensitive information collected by support units between 1970 and 1993. Concerns over privacy and safety have surged, prompting proactive efforts to mitigate risks and support affected individuals. Meanwhile, Melbourne Polytechnic revealed that enrollment information for 60,000 students had been accessed. As organizations navigate the fallout, the incident underscores the urgent need to bolster cybersecurity measures and collaborate across sectors to safeguard digital infrastructure and protect individuals’ privacy. –The Cyber Express, by Mihir Bagwe
Stay ahead of the curve with TCE Cyberwatch as we unpack the dynamic intersection of innovation and security. Delve into the transformative potential of Artificial Intelligence and its impact on corporate profitability and national security. Explore recent cybercrime incidents, including data breaches and hacking attempts, shedding light on the ongoing challenges in safeguarding digital assets. Additionally, witness governments worldwide intensify their efforts to combat cyber threats through stringent regulations and law enforcement actions. Don’t miss out on the latest insights and stay informed to navigate the complex cybersecurity landscape effectively. –The Cyber Express
In the tech market whirlwind dominated by Apple’s stock-buyback buzz, Fortinet and Cloudflare are grappling with turbulence. Cloudflare’s cautious sales forecast and Fortinet’s below-expectation billings reveal the deepening uncertainty in the cybersecurity sphere, exacerbated by geopolitical shifts and intensified competition from industry giants like Amazon Web Services and Microsoft Azure. Despite Cloudflare’s surpassing earnings and Fortinet’s modest revenue uptick, investor confidence wavers amid concerns over elevated enterprise values and competitive pressures. Analysts, while cautious, see potential buying opportunities amidst the volatility, suggesting a careful balance between risk assessment and growth prospects in the evolving cybersecurity landscape.
–Barrons, by Karishma Vanjani
The 2023 cybersecurity landscape reports a surge in threats like compromised credentials, infrastructure attacks, and ransomware, demanding urgent attention. Key findings reveal widespread vulnerabilities stemming from poor password practices and escalating attacks from organized adversaries. To counter these threats, organizations must adopt a multi-layered defense strategy, including improved password management, infrastructure protection, and ransomware prevention measures. Understanding these challenges and implementing robust security solutions is crucial to fortifying cybersecurity defenses and mitigating risks in 2024. –eSecurity Planet, by Chad Kime
From Fields to Firewalls: A Cybersecurity Odyssey
A transportation engineer at the University of Nebraska at Lincoln shifts her focus to cybersecurity after realizing the vulnerabilities in transportation systems’ IoT devices. Pursuing a master’s degree in cybersecurity online at the University of Nebraska at Omaha, she aims to safeguard farming communities by exploring the cybersecurity awareness and measures employed by Midwest farmers. Supported by UNO’s faculty, she aspires to contribute to cybersecurity advancement, envisioning secure household devices for all. Her journey exemplifies passion and dedication to securing the agriculture industry and our digital world. –University of Nebraska Omaha
London Drugs Works to Restore Operations Following Cybersecurity Breach
London Drugs is in recovery mode after a cybersecurity breach forced the closure of its stores for five days. The retailer is rebuilding its data infrastructure with expert assistance to ensure a safe return to operations. While billions of lines of data and code are being reviewed, the company assures progress and emphasizes that customer databases, including pharmacy records, remain uncompromised. With more than 80 stores affected across several provinces, efforts are underway to reopen with partial service to serve customers, especially those with urgent prescription needs. Despite the significant impact on operations, the company expresses gratitude for the support received and assures customers that steps are being taken to reopen safely and responsibly. –Vancouver Sun
LogRhythm Report: 95% of Organizations Adapt Cybersecurity Strategies
A recent report from LogRhythm delves into the shifting digital landscape, revealing that in the past year, 95% of organizations have adjusted their cybersecurity strategies. The global survey, encompassing 1,176 security leaders and professionals across five continents, examined various aspects including budget allocation, resource availability, breach preparedness, accountability, reporting capabilities, and security communication effectiveness. The report highlights three key factors driving these strategic adjustments. –Security Magazine
Click for more of our recent cybersecurity news!