Tag Archive for: requires

Attracting the Right Talent Requires the Right Story


The-Right-Talent-the Right-Story

A recent article in Forbes Magazine by HYPR’s CEO Bojan Simic discussed the cybersecurity skills gap and how practitioners and executives can address the technical workforce shortages. While that article highlighted why and how companies should look beyond current job experience, this post looks holistically at how to attract talented people. It highlights what we do at HYPR to attract and retain our talented team members from a more personal approach.

AppSec/API Security 2022

Seven years ago I met our (now) CEO for the first time. Back then, HYPR resembled an aspiring rock band. It had all the elements needed for success, and a sound that was different yet relatable to all who heard it. Throughout my career, I’ve either been recruiting for or selling enterprise software, mostly within the Information Security industry. I’ve been involved with launching some great technology, and have met some extraordinary people that I now call friends. However, little did I know that initial meeting with Bojan would eventually land me here at HYPR, working with some of the best people I’ve ever known.  

Come for the Tech, Stay for the Team

One of the major reasons I was drawn to HYPR was, of course, the innovative technology. The sheer economic advantage of our approach makes it an obvious choice for anyone who logs into a computer, web or mobile application. We’ve found a way to easily and completely get rid of passwords and finally fix the way the world logs in — and HYPR delivers. Beyond the technology though, I quickly discovered that HYPR was so much more than a tech company. 

Within my first days, I realized HYPR embodies dedication to a level I had never experienced. Dedication to what we build, dedication to our customers, dedication to each other, to having fun, to being transparent, to being empathetic, to doing it over and over again. It’s not just Engineering or Sales, or Marketing or Operations for that matter. It’s each and every person within each and every team. Yes there are challenges, but people go above and beyond to meet them together. This matters. It also raises a question — why and how do some companies go above and beyond and others don’t or can’t?

Telling the…

Source…

Food security for all requires a year-round commitment


When the pandemic began in 2020, the U.S. Department of Agriculture extended free meals to school-age children all year long, including the summer months. The program will no longer be available at the end of this school year and many food insecure families are now facing a summer without school food assistance programs.

The situation is made even more dire as inflation and the cost-of-living soars, leaving millions of individuals and families in critical need of year-round nutritional assistance.  

Food insecurity is not only detrimental to individual health, development and well-being, but is crippling the progress of communities across our state and society. More than 3.1 million Floridians struggle to afford nutritious food, and about one in five children or more than 900,000 in the state lack proper nutrition, according to a study by the Feeding America network.

Source…

Securing Taiwan Requires Immediate Unprecedented Cyber Action


The prospect of a Chinese invasion of Taiwan echoes some of the most disastrous 20th century instances of great power expansion—reminiscent, perhaps, of Nazi Germany’s Anschluss or even its subsequent invasion of Poland. Given that the latter ignited World War II, America’s strategic community has been rightly fixated on the vast military and political contingencies of a Chinese invasion that would remake Asia. 

But Taiwan is not just the geopolitical fulcrum of the Indo-Pacific; it is also the nexus of a rapidly evolving Sino-American technological competition. And if 20th century great power competition is any guide, tech races are just as important to long-term competition as territorial military contests. The U.S. needs to act now to secure the technological dimensions of a looming Taiwan crisis, or risk losing far more than the island. 

In the domain of Sino-American tech rivalry, Taiwan is unique in two aspects: First, the Taiwan Semiconductor Manufacturing Corporation (TSMC) remains the world’s tightest bottleneck in the global high-tech ecosystem, with exclusive capabilities to construct the most valuable, sophisticated computer chips in existence. Second, military conflagration in Taiwan would represent a hitherto-unknown level of cyber-intensive military conflict, the seeds of which likely have already been planted. Both of these realities demand unprecedented cooperation between the United States and Taiwan—cooperation that requires significant trust and openness in Taipei and significant counter-espionage and national security assistance from Washington. 

The Silicon Brain Trust

It’s hard to overstate the importance of TSMC’s microscopic transistors: The company’s chips are the foundation of enormous sectors of national economic growth for both the U.S. and China. They are also the backbone of the massively consequential tech race between the two countries in security-essential sectors like artificial intelligence, quantum computing and advanced military capabilities. TSMC is estimated to have cornered as much as 90 percent market share of the world’s most advanced processors, and controls a majority of the global market for made-to-order chips. To…

Source…

Rule requires banks report significant ‘computer-security incidents’ within 36 hours | Article


The Office of the Comptroller of the Currency (OCC), Federal Reserve, and Federal Deposit Insurance Corp. (FDIC) approved the policy, which also requires service providers for financial institutions to notify affected bank customers of any service outage caused by a computer-security incident that lasts longer than four hours.

The rule is effective April 1, 2022, and compliance is required by May 1, 2022.

A computer-security incident is described in the rule as an “occurrence that results in actual harm to the confidentiality, integrity, or availability of an information system or the information that the system processes, stores, or transmits.” Such incidents can be caused by a variety of factors, including cyberattacks launched by hackers with “destructive malware or malicious software” as well as “non-malicious failure of hardware and software, personnel errors, and other causes.”

A “notification incident” is defined in the rule as a computer-security incident “that disrupts or degrades, or is reasonably likely to disrupt or degrade, the viability of the banking organization’s operations; result[s] in customers being unable to access their deposit and other accounts; or impact[s] the stability of the financial sector.”

The rule requires any bank services provider subject to the Bank Service Company Act (BSCA) to notify at least two individuals within the affected banking organization of a computer-security incident that it “believes in good faith could disrupt, degrade, or impair services provided subject to the BSCA for four or more hours.” The bank organization would then determine if the incident rises to the level of a notification incident and inform its regulators if that is the case.

“The notification requirement for bank service providers is important because banking organizations have become increasingly reliant on third parties to provide essential services,” the rule said. “… [A] banking organization needs to receive prompt notification of computer-security incidents that materially disrupt or degrade, or are reasonably likely to materially disrupt or degrade, these services because prompt notification will allow the banking…

Source…