Apple insider

Apple’s self-driving car could have wide-opening doors, light-based privacy system

Doors are an important element in the design of a car, as they not only are functional in allowing people in and out of a vehicle, but they can also inform the styling. Car doors have evolved from a simple swinging hinge to "gull wing"
/
San Francisco votes to ban city use of facial recognition technology

San Francisco votes to ban city use of facial recognition technology

SAN FRANCISCO (Reuters) - San Francisco officials on Tuesday voted 8 to 1 to ban the purchase and use of facial recognition technology by city personnel, in a move to regulate tools that local Silicon Valley companies helped develop. The ordinance, which also would require
/

Cybersecurity Camps Teach Students

A US federal government cyber-security camp pilot program, launched recently to show students how to counter online security threats, has been hugely successful and could lead to an unprecedented increase in the number of people wanting to become computer scientists specializing in cyber-security.

The camps, launched in 2014 and which offer a new solution to this problem, were the brainchild of Steven La Fountain, dean of the College of Cyber at the National Security Agency. His idea  was not only to train people who would become part of a successful future cyber-security force, but also to improve teacher skills and inform civilians about what was required.

cybersecurity

(Image Source: Shutterstock)

The cyber-security camps, specifically, are a result of a program funded by the National Science Foundation (NCF) and National Security Agency (NSA), GenCyber, that have a mission to increase the body of cyber-security experts needed by both private companies and government agencies. These organizations maintain that by teaching young people about potential online threats at an early age, they will gain respect for online information and make sure that they don’t misuse it later in life.

Associated Press reported that hundreds of students in various parts of the USA would be participating in GenCyber camps in Vermont, South Dakota and southern California. This presumably means that the program is growing.

The first prototype camps were launched late 2014, and at the time the NSA stated it hoped that there would be an eventual “presence” in schools in all 50 American states. Today Josh Pauli, associate professor at Dakota State University, where 200 students are reportedly joining the program, said it was important for students to be “really cyber aware,” or at least “be ready for the next wave of the cybersecurity workforce.” He also said he believed around 200 students would enroll in the next summer program.

Last year (2014) the pilot program ran six camps. This summer the goal was 30, and according to LaFountain, already more than 43 camps have been held at a cost of $4 million. LaFountain initially nominated a goal of 200 camps by 2020, but now says he realizes that this will happen a lot sooner than anticipated.

CybercampAccording to Dr.Victor Piotrowski, lead program director of CyberCorps’ Scholarship for Service program that the NCF runs, every company now has cyber-security on its radar, and everyone wants to hire computer science specialists to deal with the problem. But, “unfortunately we don’t have the capacity.”

The camps are clearly a new way that could prove to be the answer to the need for more cyber-security specialists.

With the probability of cyber-attacks increasing worldwide, the Information Systems Audit and Control Association (ISACA) has warned that it is vital to prepare as best as possible. The problem, though is that there is a lack of “skilled talent,” says an ISACA report. A global survey indicates that 16 percent of IT and cyber-security managers think that at least 50 percent of the people who apply for jobs are qualified, another 53 percent say it takes on average three to six months to find applicants who fit the qualifications they require. In addition to this, there are many organizations that have very little confidence in the cyber-security abilities of their existing staff members.

attempts-security

The study reveals “a high-risk environment” that is made a lot worse by “a lack of skilled talent.” It seems that the biggest problem is a lack of ability to understand the business, followed by skills deficiencies in both communications and technical skills. Further, more than half (52 percent) of the IT managers responding to the study believed that not even a quarter of those applying for jobs were qualified.

This particular study also reported a large number of security breaches, most of which (33 percent) were considered to be the result of personal gain.

It is certainly clear that education is key, and that cyber-security camps have a vital role to play.

By Penny Swift

Penny Swift

Penny has been a professional writer since 1984 - Penny has written more than 30 general trade books and eight college books. She has also written countless newspaper and magazine articles for: Skills on Site, Popular Mechanics (SA) and SA Conference, Exhibitions and Events Guide.

Penny has a BA in Social Sciences and currently resides in Cape Town, South Africa.

Project Management Course Bundle

Project Management Course Bundle

Need to earn 60 PDUs to maintain your Project Management Professional (PMP)® certification? Are you also looking for a high quality and interesting training program to fulfill this requirement? ...

$999.00Enroll Now

Microsoft Professional Program in Cybersecurity

Microsoft Professional Program in Cybersecurity

As the number of cyberthreats continues to increase, the demand for skilled cyber professionals is also growing. Become knowledgeable on the wide set of skills that will allow you to start or grow a cybersecurity career. Protect. Describe the current threat ...

$990.00Learn More

Chatbots vs Virtual Assistants

Chatbots vs Virtual Assistants: What Is The Difference?

Chatbots vs Virtual Assistants If you are running an online service or e-commerce store, chances are you offer automated online ...
David

The Coming Era of Simple, Fast, Incredibly Cheap Cloud Storage

Cheapest Cloud Storage Data storage, like other commodities such as bandwidth, electricity, or simple computer power, underpins nearly everything we ...
What Skills Do I Need to Become a Data Scientist?

What Skills Do I Need to Become a Data Scientist?

Becoming a Data Scientist Leveraging the use of big data, as an insight-generating engine, has driven the demand for data ...
The Benefits of Virtualizing SD-WAN and Security

The Benefits of Virtualizing SD-WAN and Security

Benefits of Virtualizing SD-WAN As more companies adopt SD-WAN technology to enhance the agility of their networking architecture, they must ...
Machine Learning Open-Source Tools

Do More With Machine Learning Thanks to These 6 Open-Source Tools

Machine Learning Open-Source Tools We are in the middle of a machine learning, AI and big data renaissance — at ...
Cloud And Cybersecurity: 5 Things CISOs Need To Consider

Cloud And Cybersecurity: 5 Things CISOs Need To Consider

The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, ...
Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has ...
Glassdoor’s 10 Highest Paying Tech Jobs Of 2018

Glassdoor’s 10 Highest Paying Tech Jobs Of 2018

Glassdoor is best known for its candid, honest reviews of employers written anonymously by employees. It is now common practice and ...