My last article for ITSPmagazine defined the term “technologist,” a label that applies to people working in companies of all shapes and sizes across the country along a broad spectrum of industries—not just those that write software and make hardware. in this new piece, we will take a look at the mentorship process for the next generation of technologists.
Imagine for a moment you had a twin that you didn’t know about. A virtual copy of you that shopped where you shopped, read what you read, and was interested in exactly the same things you were. For all intents and purposes, this twin was you but with one big difference; this copy of you cared almost nothing about your privacy. Surprise! This copy of you exists and isn’t going away any time soon. So… now what? Well, for starters, you should read this Q&A between Jason Elrod and Sean Martin.
How can U.S. companies possibly narrow a tremendously cavernous skills gap in the world of IT security? Social innovation executive and author, Charles Eaton, believes one viable solution is now wending its way through our nation’s middle and high schools. In this 5-part series, Eaton delves into the five keys for “Raising the Next Generation of Technologists” and filling the cybersecurity skills gap in the process.
There is an overarching theme driving these security breaches: ineffective adherence to secure design principles. Expert Ted Harrington explores the world of secure design principles (and anti-principles) as a means to build resilient systems.