Cybersecurity jobs protecting government and business in high demand

Madison Cyber Labs at Dakota State University help students study and work through data.

As people consider careers or new options in work, high-paying jobs in traditional fields like health may come to mind, but one industry is prospering off of protecting the data of others.

Cybersecurity, the protection of computer systems and networks, is emerging as a promising industry in South Dakota with more than enough jobs. The issue? There aren’t enough faculty to train people to fill that work.

From 100% job placement for some graduates to millions in funding for local cybersecurity startups, there’s a small local network that reaches thousands of clients popping up in South Dakota — and graduates who are in high demand.

But the industry is small now and has an unsure future ahead if it can’t keep up. Right now Dakota State University’s acceptance rate is 21% for its PhD programs including that in cybersecurity, on par with a public Ivy league for 2021, for computer sciences.


National Cyber Security Day; How one business bounced back from a hack

COLORADO SPRINGS — As National Cyber Security Day, today is a day to bring awareness to businesses on how they can protect their systems. In today’s world, the chances of getting hacked are extremely high. A hack occurs every 39 seconds according to Security Magazine.

According to Fortune, 66 percent of businesses do not believe they could recover from a hack. The most important thing businesses can do is protect themselves by educating their employees and clients on what a hack looks like. Pop-ups that are very strange on your computer, emails that are phishing in nature, when people create new social media accounts for you and you do not know how that happened and your email suddenly being moved to a trash folder without you knowing how it happened, these are all signs that you have been hacked. One business in Colorado Springs recently had a client encounter a hacking situation and has fully recovered. Here is what they had to say.

“This time they called it into their cyber liability insurance and for them, this is all the peace of mind that they needed. Immediately they had a team of investigators who would data mind all the data, figure out what’s going on, find out where their breach had happened, close those holes, get that person out of the system, change the passwords, for this company it was very small so they didn’t have an internal IT, they paid for IT,” said Heather McBroom, Founder of Precision Services, Inc. Precision Insurance Services.

“And I think as the education gets out there, I think as consumers start to push back and say, “No, this is not okay.” If you suffered a breach, you need to protect my data then we are going to see more and more people that are willing to take those steps and take the extra protection for cyber liability insurance or the IT management services.”

If you think you’ve been hacked, tell your company right away and make sure your business does something before the damage worsens.

You should also change your passwords, and security questions and set up two-step verification.


Cybersecurity report reveals critical business vulnerabilities

Across the business sector, companies are reporting a higher-than-ever frequency of cyberattacks and cybercrime.

This is in part due to COVID-19 — hackers, wanting to take advantage of the chaos caused by the pandemic, growing digitalization, and the pivot to work-from-home, have stepped up their attack efforts over the past 18 months.

All businesses — from small ecommerce retailers to major oil and gas companies — are at risk. However, predicting which assets hackers will attack can be challenging, potentially making business networks harder to defend.

Exploitable assets become a liability

According to data from a new Randori report, titled “The Attack Surface Report,” 1 in 15 organizations are running vulnerable versions of SolarWinds. Some of these versions contain exploits that can provide attackers with unauthenticated remote code execution, granting the hackers access to full control of a system.

As attacks become more frequent, exploitable assets can become a serious liability for businesses.

To assist businesses with identifying vulnerable assets, Randori has developed a measure that aims to predict how tempting a given asset is to cybercriminals.

The “Temptation Score” is calculated using a proprietary weighting of six asset characteristics, including enumerability, criticality, post-exploitation potential, and research potential.

Randori observed more than 100,000 assets with these characteristics to develop the new metric and gather data on the state of internet-exposed assets.

The report notes that many organizations continue to use vulnerable versions of SolarWinds, and goes on to describe why the company considers these assets tempting for hackers.

SolarWinds is particularly attractive to hackers due to its wide usage and prevalence of well-known exploits. Other examples of vulnerable software with high Temptation Scores include Microsoft IIS 6, remote desktop protocols (RDPs), VPNs such as Cisco’s Adaptive Security Appliance (ASA), or Citrix NetScaler.

According to the report, at least 15% of companies have an exposed version of IIS 6 online, 38% of organizations use Cisco’s ASA firewall, and 46% of organizations are running Citrix…


JFrog Announces Timing of Third Quarter 2021 Financial Results | Business

SUNNYVALE, Calif.,–(BUSINESS WIRE)–Oct 14, 2021–

JFrog Ltd. (“JFrog”) (NASDAQ: FROG), the Liquid Software company and creators of the JFrog DevOps Platform, today announced it will report financial results for the third quarter of fiscal year 2021 on Thursday, November 4, 2021, following market close.

JFrog will host a conference call to discuss the results at 2:00 p.m. PT on the same day, which we encourage interested parties to attend for the interactive QA session.

Event: JFrog’s Third Quarter Fiscal 2021 Financial Results Conference Call

Date: Thursday, November 4, 2021

Time: 2:00 p.m. PT (5:00 p.m. ET)

Webcast link:

About JFrog

JFrog is on a mission to be the company powering all of the world’s software updates, driven by a “Liquid Software” vision to allow the seamless, secure flow of binaries from developers to the edge. The company’s end-to-end DevOps platform – the JFrog Platform – provides the tools and visibility required by modern organizations to solve today’s challenges across critical pieces of the DevOps cycle. JFrog’s hybrid, universal, multi-cloud DevOps platform is available as both self-managed and SaaS services on AWS, Microsoft Azure, and Google Cloud. JFrog is trusted by millions of users and thousands of customers, including a majority of the Fortune 100 companies that depend on JFrog solutions to manage their mission-critical software delivery pipelines. Learn more at

View source version on

CONTACT: Investor Contact:

JoAnn Horne

[email protected]



SOURCE: JFrog Ltd.

Copyright Business Wire 2021.

PUB: 10/14/2021 09:15 AM/DISC: 10/14/2021 09:17 AM

Copyright Business Wire 2021.