Làm gì sau 35 tuổi


Bạn có thể theo nghề lập trình đến năm bao nhiêu tuổi ? Photo by Andrew Neel on Pexels.com Người viết: Trịnh Minh Cường Tác giả bài viết này đã 40 tuổi, sẽ theo nghề lập trình viên đến năm 50. Hiện đã kiếm đủ để hạnh phúc với cuộc sống giản dị. Các bạn đừng quá … Continue reading Làm gì sau 35 tuổi

Free Courses to Master IBM Watson


https://www.youtube.com/embed/EdceqGUuEQM?version=3&rel=1&fs=1&autohide=2&showsearch=0&showinfo=1&iv_load_policy=1&wmode=transparent Free Courses to Master IBM Watson IBM Watson is also developing technology in business advancement. It is a technology platform that uses AI, natural language processing, ML, etc. to get the best outcome. 644 more wordsFree Courses to Master IBM Watson | Cognitive Class — Gadacts

MOSC 2020 – Modelling Smart Cities – Call for Papers and Tools.


Emerging Technology Observatory

2020-02-10

My journey in smart cities goes a bit deeper as member of the Program Committee of MOSC 2020. The workshop brings together Model Driven Engineering (MDE) and the smart city domain with the objective to explore how MDE can be successfully applied to smart city projects.

The objective of MDE  is defining models, methods and tools that can create a precise representation of software intense systems. That representation looks at the entire life cycle of the system supporting software engineers and other stakeholders in their work from the implementation to the maintenance of the system. MOSC 2020 wants to explore all this in a smart city context.

Call for papers and tools is now open. Here (https://mosc.gssi.it/) to know more about it and how to apply.

View original post

How to bring ‘WOW’ factor in SOC visits


future of cybersecurity

If you are in process of buying a car – probably you’ll do self research, visit the showrooms, opt for self-drive, experience it and then make decision – whether or not to buy the product and services.

In cyber security – enterprise before making outsourcing decision on security operations and management will opt for SOC visits. The objective for them is now not to see marketing presentation in conference room by sales function, rather to experience the ‘day in a life’ of SOC personnel, process and technology

Understand your customer expectations

Its important to know the below and set expectations before the visits

  • Who all are visiting? When?
  • How long is the visit?
  • What role they play in their organization?
  • What technology background they are?
  • Is there any specific use-case/ scenario deep-dive demonstration required?
  • Know-how of their requirements

SOC environment are to be awesome

It require investment to build the…

View original post 810 more words

Cyber security leaders need fraud prevention with digital business


future of cybersecurity

Digital transaction and consumer’s online presence

Technology advancements has benefited both business and consumer by adopting digital technologies. With increase in adoption of smart phones and smart apps – the fraudulent activities has also exploded. Frauds such as identity thefts, merchant and triangulation frauds, affiliate and clean frauds, phishing, pagejacking, and counterattacks occur during online transactions. Other frauds are more prevalent for business including application fraud, transaction fraud, anti-money laundering fraud, fake listing and scams, fake accounts, content moderation, bot attacks, promotion abuse. The digital channels such as web, mobile and telephony are interaction juncture for fraudster to perform hacking attempts to both business and consumer.

Cyber security leaders focused on fraud prevention are concerned with fraud losses within organizational risk tolerances and thus want to detect fraud as it happens.

Online fraud management solution providers

The fraud management solutions are broadly categorized into below sub segments

  • Fraud analytics

View original post 640 more words

Decryption tool for the Maze ransomware


future of cybersecurity

Ransomware is a type of malicious software cyber actors use to deny access to systems or data. The malicious cyber actor holds systems or data hostage until the ransom is paid. After the initial infection, the ransomware attempts to spread to shared storage drives and other accessible systems. If the demands are not met, the system or encrypted data remains unavailable, or data may be deleted. Ransomware can be delivered in various ways, most commonly via spam/phishing emails containing a malicious document. Other forms of infection include exploit kits, trojans and the use of exploits to gain unauthorized access to an infected device.

Brands affected with Maze Ransomware

What is Maze Ransomware?

Maze is a file encrypting virus and also a successor to ChaCha. It uses a sophisticated RSA and ChaCha20 cipher to lock up data, and appends a string of random 4-7 characters at the end of each file…

View original post 526 more words