What Are the Benefits of Digital Identity in the Metaverse? | #itsecurity | #infosec

As students head back into classrooms this fall, some schools are already using the metaverse for teaching and learning. Yet, according to Jaime Donally, engagement director at Identity Automation and a former EdTech K–12 influencer, the metaverse doesn’t exist — at least, not to its full potential. “There are elements of the metaverse that…

read more

How technology management is changing in a hybrid world | #itsecurity | #infosec

The ongoing pandemic has caused organizations to shift to a more flexible and hybrid work environment. The adoption of a hybrid work model creates inevitable challenges for IT departments to manage technology assets. Historically, under a pre-pandemic lifestyle, legacy assets would have been classified as on-premises data center servers, desktop PCs,…

read more

Program Officer- Odesa – Ukraine | #itsecurity | #infosec

Project HOPE is an international NGO of more than 900 engaged employees and hundreds of volunteers who work in more than 25 countries, responding to the world’s most pressing global health challenges. Throughout our 60-year legacy, Project HOPE has treated millions of patients and provided more than $3 billion worth…

read more

New Cybersecurity Program lead named | #itsecurity | #infosec

Dr. Horcher hails from top-ranked business school in Central and Eastern Europe Northwood University is proud to announce Dr. Ann-Marie Horcher is joining its faculty as the program lead for the university’s cybersecurity program.   Horcher recently completed a Fulbright fellowship in Warsaw, Poland at Kozminski University. Kozminski University is ranked the…

read more

Corelight Co-founder Dr. Vern Paxson Receives Prominent USENIX Security Test of Time Award | #itsecurity | #infosec

Paxson’s 1998 paper “Bro: A System for Detecting Network Intruders in Real-Time” honored for its profound impact on the field of security and privacy SAN FRANCISCO, Aug. 11, 2022 /PRNewswire/ — Corelight, the leader in open network detection and response (NDR), today announced company co-founder, and creator of Zeek®, Dr. Vern…

read more

Safety & Security Advisor – Ukraine | #itsecurity | #infosec

Job Title: Safety & Security Advisor Function: Security Job Group: Safety & Security Duty Station: Odesa, with travel to NP field locations Administrative Line Manager: Head of Mission Line Management Responsibility: Field Security Officers ABOUT US NP (Nonviolent Peaceforce) reimagines security and civilian protection in areas most impacted by conflict…

read more

Direct Digital Holdings Reports Second Quarter 2022 Financial Results | #itsecurity | #infosec

Second Quarter 2022 Revenue Up 90% Year-Over-Year to $21.3 Million Second Quarter Net Income Up 58% Year-Over-Year to $2.6 Million, or $0.18 per Share Company Raises Guidance to $70 Million–$75 Million for Full-Year 2022 HOUSTON, Aug. 11, 2022 /PRNewswire/ — Direct Digital Holdings, Inc. (Nasdaq: DRCT) (“Direct Digital” or the…

read more

NetSecurity Corporation Reveals Why Endpoint Detection and Response (EDR) Platforms are Inadequate for Computer Forensics Investigation | #itsecurity | #infosec

ThreatResponder® Platform Allows Enterprises and Forensics Firms to Conduct Deep and Legally-Defensible Remote Computer Forensic Investigations or Incident Response at Scale Within a Few Hours DULLES, Va., Aug. 11, 2022 /PRNewswire/ — NetSecurity® Corporation, a leader in endpoint threat protection, vulnerability detection, and computer forensics investigations, announced today that traditional Endpoint…

read more

CHIPS Act Advances DOD’s Emphasis on Microelectronics > U.S. Department of Defense > Defense Department News | #itsecurity | #infosec

In February, Heidi Shyu, undersecretary of defense for research and engineering, spelled out 14 technology areas of critical importance to the Defense Department. Among those are biotechnology, renewable energy generation and storage, and directed energy. But the $54.2 billion CHIPS Act, signed yesterday, advances another of those top priorities for…

read more

Thinking like a cyber-attacker to protect user data | MIT News | #itsecurity | #infosec

A component of computer processors that connects different parts of the chip can be exploited by malicious agents who seek to steal secret information from programs running on the computer, MIT researchers have found. Modern computer processors contain many computing units, called cores, which share the same hardware resources. The…

read more

Druva named as visionary by Gartner for its ability to execute and completeness of vision | #itsecurity | #infosec

Druva Inc.  announced it has been positioned by Gartner as a Visionary in the 2022 Gartner Magic Quadrant for Enterprise Backup and Recovery Software Solutions for the second consecutive year. Druva was recognized for its Ability to Execute and Completeness of Vision and believes this year’s inclusion further validates the…

read more

IU researchers awarded NSF grants for cybersecurity projects – Inside INdiana Business | #itsecurity | #infosec

The Luddy School of Informatics, Computing and Engineering on the IU Bloomington campus. (photo courtesy of James Brosher, Indiana University) Researchers from Indiana University are working on two new cybersecurity projects they say will ensure trustworthy cloud computing, as well as increase computing privacy for marginalized and vulnerable populations. The…

read more