Internet of Things is a way without coming back. According to Gartner, there are over 8 billion connected “things” in use today, and the figure will top 20 billion by 2020, including over 7 billion specifically for business use. As organisations embark on digital transformation projects, bringing IoT devices closer to users’ reality, a new cyber risk emerges. How to keep those devices safe and control the potential cyber attacks?
Check Point released their 2019 Mid-year report with the major cyber-attacks in 2019 revealing that European companies in general still at risk of cyber breaches and attacks, putting at risk sensitive information of billions of people. What characterizes 2019 is not the number of reported breaches, but rather their magnitude.
The IT skilled professional shortage is a reality in the market while IT careers still on the rise. Almost every month companies are announcing new job opportunities in Dublin, which can create a positive and competitive scenario for who is already in the market. It’s also an attractive option for people starting or changing their careers. The searching process for a course can be hard, sometimes it’s difficult to decide which is the best path to follow at that specific moment.
The first quarter of 2019 was busy for Cybersecurity professionals in general. Even though people are more aware of cyber-attacks and threats, crimes related to cybersecurity still on the rise and putting companies at risk. According to the last Risk Radar report released by Integrity 360, billions of compromised records, data leaks from cloud misconfigurations and record-setting cyber-threats were some of the main findings for the first period of the year. On the other hand, the lack of qualified professionals is not helping the situation either.
The 20-page report organised from New Horizons corporate combines responses from 1,500 IT managers and professionals worldwide to uncover key trends in IT talent development. The detailed research underscores the widening IT skills gaps that exist across growing areas such as software and application development, for example.
Now join Eric as he uses real-life spy stories to show how careful diligence, counter espionage techniques and top-notch training can help identify the numerous spies, hackers, hacktivists and trusted insiders that threaten every stroke of the keyboard.
Subscribe to our Newsletter for all the latest cheat sheets and resources.