Tag Archive for: succeed

You do not need to be a Stem genius to succeed in finance and tech


Karina Robinson is the chief executive of Robinson Hambro, a chief executive advisory and search firm.

I was the worst Spanish equities analyst in the City of London. In 1987, my boss at Morgan Grenfell fired me from my first job after 15 months. He could tell from the back of my neck, he said, that I hated the job.

My boss was almost right. It wasn’t just my neck that railed against the role: I hated it with every bone in my body. Yet I have subsequently had a 35-year career in the City and financial journalism, including being a political and economic correspondent at Bloomberg, a senior editor at The Banker, and Master of the Worshipful Company of International Bankers, a City livery company. Over the past decade, I’ve run my own boutique advisory and search firm, Robinson Hambro, along with other advisory board roles.

But this litany of positions hides a (shameful) secret: I scraped through my maths O level, a UK public exam, with a mediocre “C” grade — much to the bemusement of my maths teacher who anticipated a fail. As for physics, the situation is doubly ironic: I gave it up aged 14, yet have founded The City Quantum Summit, a conference bringing together the scientific and financial communities.

Nor am I alone: I was much reassured to hear that Sir Robert Stheeman, chief executive of the Debt Management Office, which issues UK Treasury bonds, failed his maths O level. Twice.

My experience offers, I hope, some lessons for students in their last years of school and university who are being pressured into studies that are not in tune with their souls. You do not need to be a maths genius, a computer scientist, a PhD in physics or, indeed, an expert in any Stem (science, technology, engineering and mathematics) subjects to succeed in the financial or tech sectors.

If you aren’t gifted in that way, enjoy every minute studying medieval literature or international relations. For you too might be “a dragoman” — a word I learned when reading Anna Aslanyan’s book, Dancing on Ropes: Translators and the Balance of History, and which describes the unifying thread in my career.

A dragoman was a translator in the Ottoman Empire whose power far exceeded that of…

Source…

Jamf Ends 2021 Helping Over 60,000 Customers Succeed with Apple


Jamf recaps successes in 2021 and announces key management promotions to help drive continued growth in 2022

MINNEAPOLIS, Jan. 11, 2022 (GLOBE NEWSWIRE) — Jamf (NASDAQ: JAMF), the standard in Apple Enterprise Management, today announced it is now helping more than 60,000 active customers succeed with Apple and is running on approximately 26.5 million devices worldwide.

2021 was a pivotal year for Jamf, as the company added new functionality to its Apple Enterprise Management platform to help organizations connect, manage and secure their devices. Jamf added more than 6 million devices and 13,000 customers in 2021 and is now running on approximately 26.5 million devices and serves more than 60,000 customers. These organizations include:

  • 9 of the 10 largest companies, as ranked by Fortune 500

  • 22 of the 25 most valuable brands, according to Forbes

  • 10 of the 10 largest U.S. banks, according to Bankrate.com

  • 10 of the top 10 global universities, according to U.S. News & World Report

  • 8 of the top 10 technology companies, as ranked by Fortune

In 2021, Jamf completed its three largest contracts in its history, and ended the year with its highest gross customer revenue retention rate since its founding in 2002.

“Exiting 2021, we saw continued strengthening in commercial markets across all geographies,” said Dean Hager, CEO of Jamf. “Looking ahead, this commercial momentum, along with continued investments in our go-to-market activities and new products, will help drive strong revenue growth in 2022. We are excited to continue to help our customers empower their end users with technology that is enterprise-secure and consumer-simple, while protecting personal privacy.”

Jamf further strengthened its security platform with acquisition of Wandera and cmdReporter, and rolled out key product enhancements to help organizations succeed in today’s hybrid work world
Jamf completed its acquisition of cmdReporter, a suite of security and compliance tools purpose-built for macOS, in February of 2021. Jamf also completed its acquisition of Wandera, a leader in zero trust cloud security and access, in July. These acquisitions uniquely position Jamf to help IT and security teams confidently protect…

Source…

Five Reasons Memory-Based Cyberattacks Continue to Succeed


Almost every week we see new examples of highly sophisticated organizations and enterprises falling victim to another nation-state cyberattack or other security breach. These attacks are circumventing staple security products such as next-gen firewalls, IDS/IPS systems, web and endpoint security defenses, web application firewalls and database monitoring solutions.

Breaches continue to happen at an increasing rate, with more severe consequences. Forbes reported that the year 2020 broke all records when it came to data lost in breaches and sheer numbers of cyber-attacks on companies, government, and individuals. While substantial sums have been spent on network and endpoint-based security, these breaches reflect a general lack of investment in adequate application-aware workload protection. This has continued despite repeated surveys pointing to applications and OS vulnerabilities as the largest areas of enterprise security exposure.

 

“Memory-based attacks are happening all around us and no one seems to want to talk about it because there hasn’t been a lot of defense against them. Virsec has an extraordinary and effective solution for defending against memory-based attacks. These guys are monsters in that.”
– Chief Security Architect, Schneider Electric

 

Below are five key reasons why memory-based attacks continue to evade conventional security tools:

 

1. Memory-based attacks cannot be identified via signature.

Buffer errors or return-to-libc attacks, and many other memory corruption exploits, attack the call stack or memory registers of an application in non-repeating ways. This presents problems for traditional security solutions because most approaches are based on pattern matching, using signatures of past malware or malicious actions.

While some endpoint vendors promote defenses against “memory exploit techniques”, they are still based on signatures and pattern-matching of pieces of existing executable code. Today’s advanced attackers are innovative and resourceful and easily avoid repetitive behavior that can be detected by pattern-matching.

 

2. Most security defenses focus on network protection and authorization, while memory-based attacks…

Source…

Why CISOs succeed and why they leave

Earlier this year, ESG and the Information Systems Security Association (ISSA) published a research report titled, The State of Cyber Security Careers. The report was based on a survey of 437 cybersecurity professionals, the clear majority of which were ISSA members.

Two-thirds of these cybersecurity professionals worked at an organization that employed a CSO or CISO. These individuals were then asked to identify the most important qualities that make a successful CISO. Here is a sample of the results:

  • 50% of respondents said strong leadership skills were most important
  • 47% of respondents said strong communication skills were most important
  • 30% of respondents said a strong relationship with business executives was most important
  • 29% of respondents said a strong relationship with the CIO and other members of the IT leadership team was most important
  • 23% of respondents said strong management skills were most important

Based upon this list, it’s clear that successful CISOs need to be strong business people who can work with business and IT executives. This is an important consideration since many security professionals are deeply rooted in the technology rather than the business aspects of infosec.

To read this article in full or to leave a comment, please click here

Network World Security