How can U.S. companies possibly narrow a tremendously cavernous skills gap in the world of IT security? Social innovation executive and author, Charles Eaton, believes one viable solution is now wending its way through our nation’s middle and high schools. In this 5-part series, Eaton delves into the five keys for “Raising the Next Generation of Technologists” and filling the cybersecurity skills gap in the process.
There’s an old joke in the community that there is no patch for the user – technology can be fixed, but human mistakes cannot be overcome. In this new An InfoSec Life article, Joseph Pindar shares his beliefs that peoples’ actions aren’t a problem that can be easily dismissed with a joke.
There has been a great deal of attention paid to the advantages of machine learning in security tools lately. And while it shows a great deal of promise, the reality is alone, machine learning is not enough to consistently and accurately detect, prevent or predict threats and is prone to false-positives. When considering how to reduce the overall threat exposure window, organizations need to understand how, only when combined with additional technologies, machine learning can be effective.
Network engineers are forced to keep up with the complexities and changes brought by hybrid clouds, containers, SDN and other developments. Throw the human element into the mix, and you have a recipe for outages and vulnerabilities. Expert Sajid Awan explains the significance of key findings from a global study conducted by Dimensional Research and what they mean for networks.