Remove Big data Remove Blog Remove Education Remove Technology
article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

In this blog post, I’ll discuss: Our current perimeter defense; The need to shift to a data-centric security approach; and, The need to educate the public to strengthen our critical infrastructure security posture. Perimeter defense, while necessary, is not enough to protect our sensitive data. Perimeter Defense.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Assessing the risks involved in using the latest technology is something our culture had to adopt in the early days of the computer. New technologies come with risks — there’s no denying that. In 1971, researcher Bob Thomas and his team at BBN Technologies created a virus that was later coined the “Creeper” worm.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

While she enjoys tackling topics across the technology space, she’s most passionate about educating readers on cybersecurity and Big Data. Look to see if any of these risks apply to your remote workers so you can take action and protect them. About the essayist: April Miller is a staff writer at ReHack Magazine.

Internet 223
article thumbnail

GUEST ESSAY: Here’s how ‘WFM’ tools can boost productivity — and security — of remote workers

The Last Watchdog

This is one of the main reasons why more and more companies are leveraging this digital technology — it’s the ultimate goal for any company to improve ROI and meet its bottom line. Protecting employee data from unauthorized users is paramount, especially during a time where threats towards cybersecurity organizations are imminent.

article thumbnail

Digital Transformation starts with the Employees

Thales Cloud Protection & Licensing

This past month, CEOs, elected leaders and academics from around the globe gathered at the World Economic Forum (WEF) in Davos, Switzerland, to discuss the world’s most pressing problems including technological change, global trade, education, sustainability, and gender equality. The report states that the careers of 1.4

article thumbnail

3 New Awards in 3 Weeks – We are on a Roll!

Security Boulevard

Before that, we took the gold as “ Hot Company of the Year ” in the 2022 Information Technology World Awards®, and the week before that snagged the Globee® gold award in the Disruptor Company Awards. Not attending these events but want to learn more about our cloud-based, big data API security solution?

article thumbnail

Guilty as charged (or not) for spreading FUD about women in cyber

Jane Frankland

I’d been instructed by one of my coaches to make some data “pop” so I could get through to people who consumed info more visually. As I was collating the data from numerous sources, I was struck by a few things. Firstly, there were big data gaps. Thirdly, how old some of the data was. DATA SOURCE.

Education 130