54% of all employees reuse passwords across multiple work accounts

Yubico released the results of a study into current attitudes and adaptability to at-home corporate cybersecurity, employee training, and support in the current global hybrid working era. The report surveyed 3,006 employees, business owners, and C-suit… Continue reading 54% of all employees reuse passwords across multiple work accounts

Bionic Display cuts computing power for flight simulator mixed reality

Saab and Varjo Technologies are developing a new low-cost, high-resolution mixed-reality (XR) technology for flight simulators to train pilots of the Saab Gripen E/F multi-role fighter aircraft. Called Bionic Display, it cuts the computing power requir… Continue reading Bionic Display cuts computing power for flight simulator mixed reality

Reformulating the cyber skills gap

Despite a positive (and significant) decrease from over 4 million unfilled cybersecurity jobs in 2019, there is still a staggering 3.12 million global shortage of workers with cybersecurity skills. You may find this somewhat inevitable, given that IT i… Continue reading Reformulating the cyber skills gap

Network Forensics Classes for EU and US

We have now scheduled two new live online classes, one in September and one in October. The September class is adapted to European time and the October one is adapted to American time. The contents are exactly the same in both classes. The training is … Continue reading Network Forensics Classes for EU and US

How Gamification is Changing Cybersecurity

Gamification is changing cybersecurity and the way we learn! Scott Wright, Co-host and CEO of Click Armor, joins us this month to discuss why gamification is a “game” changer in our industry. ** Links mentioned on the show ** What is Gamified Learning?… Continue reading How Gamification is Changing Cybersecurity

A Career in IT: Where Do I Start?

It is, by far, the most frequent question I get asked: How do I get started in IT/InfoSec? So many seem interested in the field of computers, system administration, networking, or information security but have no idea where to start, which can be a frustrating place to be. This blog post is for all of…

The post A Career in IT: Where Do I Start? appeared first on TrustedSec.

Continue reading A Career in IT: Where Do I Start?

How willing are enterprise leaders to use top emerging technologies?

Emerging technologies can bring the potential for increased efficiencies, cost savings and improved security for enterprises, among other benefits—but also risk that must be weighed when considering adoption. An ISACA survey report offers insights into… Continue reading How willing are enterprise leaders to use top emerging technologies?

All you need to know about Capture-The-Flag (CTF) competitions

ENISA released a report addressing the contemporary use of Capture-The-Flag (CTF) competitions around the world. It explores how these competitions work and provides a high-level analysis of the dataset of the most recent major public events. Based on … Continue reading All you need to know about Capture-The-Flag (CTF) competitions

Cybersecurity Training: Raising Awareness And Securing Your Business

Organizations are increasingly faced with threats from sophisticated criminal organizations and nation-state actors.  To mitigate the risks posed by cyber criminals, organizations must secure and protect their proprietary and sensitive information. The… Continue reading Cybersecurity Training: Raising Awareness And Securing Your Business

Security awareness training doesn’t solve human risk

Traditional employee risk mitigation efforts such as security awareness training and phishing simulations have a limited impact on improving employees’ real-world cybersecurity practices, according to Elevate Security and Cyentia Institute. The report … Continue reading Security awareness training doesn’t solve human risk