Tag Archive for: Learning

How machine learning can help crack the IT security problem


Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More


Less than a decade ago, the prevailing wisdom was that every business should undergo digital transformations to boost internal operations and improve client relationships. Next, they were being told that cloud workloads are the future and that elastic computer solutions enabled them to operate in an agile and more cost-effective manner, scaling up and down as needed. 

While digital transformations and cloud migrations are undoubtedly smart decisions that all organizations should make (and those that haven’t yet, what are you doing!), security systems meant to protect such IT infrastructures haven’t been able to keep pace with threats capable of undermining them.  

As internal business operations become increasingly digitized, boatloads more data are being produced. With data piling up, IT and cloud security systems come under increased pressure because more data leads to greater threats of security breaches. 

In early 2022, a cyber extortion gang known as Lapsus$ went on a hacking spree, stealing source code and other valuable data from prominent companies, including Nvidia, Samsung, Microsoft and Ubisoft. The attackers had originally exploited the companies’ networks using phishing attacks, which led to a contractor being compromised, giving the hackers all the access the contractor had via Okta (an ID and authentication service). Source code and other files were then leaked online.

Event

Transform 2023

Join us in San Francisco on July 11-12, where top executives will share how they have integrated and optimized AI investments for success and avoided common pitfalls.

 


Register Now

This attack and numerous other data breaches target organizations of all types, ranging from large multinational corporations to small startups and growing firms. Unfortunately, in most organizations, there are simply too many data points for security engineers to…

Source…

Sonic Foundry’s Global Learning Exchange™ Announces Partnership with EC-Council University


Partnership will provide Global Learning Exchange students with access to globally recognized cyber security certification programs.

Sonic Foundry, Inc. (NASDAQ: SOFO), the trusted leader in video capture, management and streaming solutions, today announced that its Global Learning Exchange™ (GLX) business, which provides students around the world with cost-effective, locally supported access to top-tier online learning solutions, has finalized a partnership agreement with EC-Council University (ECCU), the education arm of The International Council of Electronic Commerce Consultants (EC-Council) and the globally-recognized leader in cyber security education and technical certification.

This partnership will provide Global Learning Exchange students with access to an extensive menu of cyber security certifications, including Certified Ethical Hacker, Certified Network Defender, and Certified Hacking Forensic Investigator. These certifications are endorsed by the U.S. National Security Agency (NSA), the Committee on National Security Systems (CNSS), and other leading security bodies, ensuring that students who successfully complete their coursework will enter the market with a widely recognized credential in one of the world’s fastest-growing job sectors. Additionally, ECCU certifications are often transferable as course credits for Bachelors and Masters-level degree programs in cyber security and computer science.

Sonic Foundry CEO Joe Mozden, Jr. commented, “From day one, Global Learning Exchange has focused on providing students with access to future-oriented, career-focused education programs. Cyber security is one of the fastest-growing fields in the global job market, and ECCU clearly represents the global standard for cyber security education. We are thrilled to announce ECCU as an official Global Learning Exchange partner and we can’t wait to introduce prospective students to its rich variety of certification programs.”

ECCU President Lata Bavisi added, “Today’s cyber workforce is sorely under-resourced. Industry estimates indicate that the number of unfilled jobs in cybersecurity will continue to increase. By partnering with GLX, EC-Council…

Source…

Learning from Ghana’s Multistakeholder Approach to Cyber Security – Africa Center for Strategic Studies


Ghana’s inclusive approach to developing a national cybersecurity strategy offers a model for how to rapidly build cyber capacity without undermining the safety of citizens.

Ghana's Joint Cybersecurity Committee

The inauguration of Ghana’s Joint Cybersecurity Committee. (Photo: Cyber Security Authority)

As internet penetration has exponentially grown, African countries have become more exposed to cyber-related threats. Increasingly organized malicious actors deploy increasingly sophisticated forms of malware that threaten critical maritime and energy infrastructure, cause billions of dollars in annual losses, disrupt internet access, and steal sensitive information from governments, politicians, businesspeople, citizens, and activists across the continent. Most African countries have experienced at least one publicly documented disinformation campaign, a majority of which are sponsored by external actors.

Unfortunately, most African countries have yet to establish foundational cybersecurity policies to confront these threats. A majority have yet to author a national cybersecurity strategy, to set up institutions capable of responding to major cybersecurity incidents, or to define an approach to international cooperation in cyberspace.

“Ghana has placed a citizen-centric, multistakeholder approach at the core of its efforts to address the country’s cybersecurity challenges.”

Ghana is not most African countries. It is 1 of only 12 nations in Africa to possess both a national cybersecurity strategy and national incident response capabilities. It is also one of only four to have ratified both the Budapest and Malabo Conventions, two major treaties aimed at addressing the international dimensions of cyber-related threats.

Just as impressively, Ghana has placed a citizen-centric, multistakeholder approach at the core of its efforts to address the country’s cybersecurity challenges. Civilians are in leadership roles in shaping most aspects of cybersecurity policy and strategy, from defining interagency responsibilities to developing incident response capabilities. Other countries across the continent have much to learn from Ghana’s approach, which has brought tremendous growth in cyber capabilities, enabled…

Source…

Cybersecurity Tips from the People Protecting the Most Critical Sites on Earth | Schneider Electric