For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Mark Kerzner, software developer and thought leader in cybersecurity training who is also the VP at training solutions company, Elephant Scale. His company has taught tens of thousands of students at dozens of leading companies. Elephant Scale started by publishing a book called ‘Hadoop Illuminated‘.
As companies generate an ever-increasing amount of data, security information and event management (SIEM) becomes increasingly challenging. Cybersecurity professionals have more to manage, and as cybercrime rises, there is less time to do so. While big data poses challenges for security teams, it also presents an opportunity. As of 2019, 52.5% of organizations worldwide have been using big data, with another 38% planning to do so in the future.
Written by Devin Partida As companies generate an ever-increasing amount of data, security information and event management (SIEM) becomes increasingly challenging. Cybersecurity professionals have more to manage, and as cybercrime rises, there is less time to do so. While big data poses challenges for security teams, it also presents an opportunity. As of 2019, 52.5% of organizations worldwide have been using big data, with another 38% planning to do so in the future.
Ransomeware can be a company’s worst nightmare. It’s not simply “getting a virus” or “clicking on a malicious email.” It is a systematic plan created by hackers to take your private information. Once they have a foothold in your private data, they use their position to blackmail you into submitting a payment. Technology to prevent ransomware has gotten better but attackers have gotten smarter and more methodical.
DevOps and Agile are popular modern software development methodologies. According to the 14th Annual State of Agile Report, 95% and 76% of the respondents stated that their organizations had adopted Agile and DevOps development methods, respectively. Interestingly, both approaches have the same aim: deliver the end product as efficiently and quickly as possible.
Last year’s IDC’s Cloud Security Survey found that nearly 80 percent of companies polled have suffered at least one cloud data breach in the past 18 months.
Where would we be without our beloved Excel spreadsheets? Since Microsoft first launched its Excel spreadsheet software in 1985, it has grown to arguably become the most important computer program in workplaces globally. The spreadsheet has truly become entrenched in daily business processes as well as critical applications - but the million dollar question is - are spreadsheets secure? Unfortunately when it comes to spreadsheet security, with popularity comes complacency.
When I turned 7, I got my first BMX bike. Of course, within a week my best friend and I built a ramp with plywood and cinderblock. I remember the first jump vividly. I sped down the street like a miniature Evil Knievel and hit the ramp at a pretty good clip. A moment after I caught “big air,” my front tire hit the road, and I went over the handlebars – leaving a fair amount of skin on the road.