Kachina Shaw

Kachina Shaw

Latest content from Kachina Shaw

Keeping Security Monitoring In-House Becoming Riskier for Some Businesses

19 May, 2015

It has become a question of balance and value, with IT organizations being asked to set up and monitor millions of alerts and identify the most important ones in an instant.

...More >

Cybrary, Women in Technology Create Pilot Program for Cybersecurity Skills

13 May, 2015

Two professional organizations that are focused on providing technology skills to some underserved and un-reached populations are launching a joint program to help change access to cybersecurity training.

...More >

IT Career News: Cybersecurity Hiring, Working Without Data, Relieving Stress

08 May, 2015

Career news this week included new ideas in cybersecurity hiring, biological sources of stress for women, award-winning student coders, Asians in Silicon Valley, and treating employees as well as you treat customers.

...More >

Dream It. Code It. Win It. 2015 Winners Announced

06 May, 2015

Winners worked on solutions in virtual reality, computer simulation and biological-related applications, among many others. Interestingly, as was the case in 2014, the majority of the applicant pool were female.

...More >

Security Trends and Best Practices Hangout

06 May, 2015

May 7, join us in a Google Hangout conversation. QuinStreet editors will discuss security research and how cybersecurity is changing the business.

...More >

Ignore Solution to Phishing, Spearphishing Risk at Your Peril

16 Apr, 2015

Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.

...More >

IT Career News: Productive Remote Work, Meeting the New Boss, Lynda Sells

10 Apr, 2015

IT career news included a huge acquisition in online education, details on how workers really use collaboration tools, and sources of productivity that benefit both employer and employee.

...More >

Nation-State Attackers Require a Different Response

09 Apr, 2015

In the same way that the attackers took their time entering a system, the affected company can take its time isolating and studying the malware, rather than immediately sounding an alert.

...More >

Yale MBA Program Adds Management of Software Dev Class

07 Apr, 2015

Though a one-off class may provide just enough information to make a graduate dangerous, the skills necessary to manage a successful development team are gaining more attention in the workplace.

...More >

IT Career News: Odd Questions, CIO vs. CTO, Money Talks

27 Mar, 2015

News this week included weird interview questions, the demise of the CIO or CTO, data ethics, legacies, and putting its money where its mouth is in Indiana.

...More >

Why the Data Security and Breach Notification Act Is Drawing Ire

24 Mar, 2015

We may never see a completed national data protection and breach notification law, if questions about language, coverage and interference with state protections aren't adequately answered.

...More >

Hiring Solution: Health Care IT Internships for Veterans

18 Mar, 2015

Chicago's Rush University Medical Center has a military veteran in IT management and a robust internship program for veterans interested in tech work.

...More >

Cybersecurity Project Targets Better Patient Health

17 Mar, 2015

Better outcomes for patients is the added level of urgency in cybersecurity efforts for health care organizations.

...More >

Internet of Things Means Everyone Wants a Data Scientist

13 Mar, 2015

Infobright CEO Don DeLoach says it's early days for data scientists, but we can still make some solid predictions about how they'll help develop the value of the Internet of Things.

...More >

A Positive Spin on Security as Business Enabler

10 Mar, 2015

A message on the full range of benefits of security tools and approaches can help bring executives and the board closer together on strategic planning.

...More >

IT Pros with Linux Skills Finding Job Market ‘Easy’

06 Mar, 2015

Not surprisingly, hiring managers say it is hard to find the Linux talent they seek, reports Dice.

...More >

What’s Behind the C-Suite Disconnect on Risk

02 Mar, 2015

Culture, dysfunctional communication, and job function demands all contribute to an important disconnect on how to prioritize cybersecurity risks in the C-suite.

...More >

Cybrary.IT Survey Finds Security Training in High Demand

18 Feb, 2015

The price of training is a major issue for individuals and companies, as both attempt to keep up with rapidly changing cyber threats and the growing need for specialized security skills.

...More >

Encryption Not a Black and White Approach

13 Feb, 2015

Organizations are being led to believe that encryption is an either-or choice, but that is not the case.

...More >

Cybersecurity Insurance, IT Processes Melding into New Approach

11 Feb, 2015

Awareness of the breadth and depth of damages from data breaches is boosting demand for increasingly sophisticated cybersecurity insurance products, says MetricStream's Yo Delmar.

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.

Thanks for your registration, follow us on our social networks to keep up-to-date