Equifax says the cause of a data breach affecting 143 million people stems from its web server's open-source software. CEO Richard Smith is scheduled to give testimony regarding the breach to House lawmakers on Oct. 3.
Online MS in Cybersecurity from Drexel University Drexel University's online MS in Cybersecurity utilizes the College of Computing & Informatics and College of Engineering's network of professionals to give students access to the latest research, tools and insights. Online programs are available in such areas as national security management, cybersecurity and intelligence. Learn more!
ChinaFlashMarket.com forecasts the worldwide market for NAND flash memory devices will exceed $65 billion in 2020, compared with $40 billion this year. Sales of all memory chips will rise from $95 billion in 2017 to $120 billion in three years, it is predicted.
Billions of Bluetooth-enabled devices, including smartphones, smart TVs and smartwatches, are at risk of an attack dubbed BlueBorne. Data can be intercepted and malware can be installed through silent "man in the middle" attacks, researchers discovered.
Gartner Symposium/ITxpo At Gartner Symposium/ITxpo, the world's top CIOs gain a strategic view of the emerging trends shaping IT and business. Experience the value of Gartner analysts, industry experts, peers and solution providers, and learn how to achieve greater impact as a leader. Learn more.
President Donald Trump has barred an investor group that includes Chinese backers from acquiring US chipmaker Lattice Semiconductor, which makes programmable logic chips. The White House said the national-security concerns raised by the deal include "the Chinese government's role in supporting this transaction, the importance of semiconductor supply chain integrity to the United States government, and the use of Lattice products by the United States government."
CEOs and managing directors are most likely to have their email addresses faked by hackers, but the most likely targets are company chief financial officers, a Trend Micro report states. To avoid attacks, companies should use filters and other email solutions, while also training their staff on how to identify the threats.
China's Ministry of Industry and Information Technology has announced the development of a central database that will be used by online companies for reporting cybersecurity threats and data breaches. Failure to report these threats will result in fines, warnings and other penalties.
Recruiting in IT is fast becoming a lucrative industry with tons of demand for new talent. Top professionals share their secrets in this CompTIA Blog entry.
Your next move: Help desk technician
If you like to solve technical issues and work with people, then help desk technician may be a good next step for you. The next installment of the CompTIA series, "Your Next Move," explores the duties and responsibilities of a help desk technician. Visit CompTIA IT Career news to learn more.
Balancing work and life
In a new edition of CompTIA's Volley podcast researchers Carolyn April and Seth Robinson discuss a recent New York Times article on the work-life balance (or lack thereof) in many Silicon Valley firms. They also previewed upcoming CompTIA research that looks at how traditional channel firms are incorporating SaaS into their portfolios. Volley is available from Apple iTunes and SoundCloud.