Monday 3 May 2021

Interesting Reads And Information -- IRAI -- 210501

What is cyber hygiene?

Cyber hygiene (or cybersecurity hygiene) is a cybersecurity practice that maintains the basic health and security of hardware and software. Cyber hygiene is a joint precautionary measure performed by an organization's security practitioner, computer system administrator and users to help protect from attacks. The basic practice aids in maintaining and protecting already properly functioning devices, ensuring they are protected from threats such as malware.

Cyber hygiene aims to keep any sensitive data organized and secure it from theft or attacks. The concept works similarly to personal hygiene, where an individual maintains their health by taking precautionary measures that would help ensure their health. If an individual neglects their health, they might catch a cold. If an organization neglects cyber hygiene, then it could lead to a virus and data breach.

In order to know what is on an organization's network and how it's associated with risk, an organization needs to develop a cyber resilience plan that can evaluate their cyber hygiene.

https://searchsecurity.techtarget.com/definition/cyber-hygiene


Ransomware 101: A Security Field Guide

Ransomware takes hostage of a computer’s files by encrypting them and demanding payment, with dire consequences if victims don’t comply. These consequences can range from deleted files to attackers leaking sensitive information on the public internet.

This guide includes:
What is Ransomware?
How does Ransomware Work?
Preventing Ransomware
Case Study: AIDS Trojan 
Case Study: Archievus 
Case Study: Reveton 
Case Study: WannaCry 

https://www.sdxcentral.com/security/guides/ransomware-101-a-security-field-guide


Career Guide: Ethical Hacker

Ethical hackers, or white hat hackers, act like the enemy when it comes to cybersecurity. Companies that want to see how strong their security is will contact a consulting firm and have an ethical hacker attempt to break into their system. This can involve everything from SQL injections, to DDoS attacks, to using social engineering to gain access. The hacker will then write up a detailed report of the system’s vulnerabilities and how the company can fix them.

Ethical hackers are typically certified, meaning they have to sit through an accredited course and pass an exam.

This ethical hacker career guide includes:
What is an Ethical Hacker?
Top 10 Skills
Top 10 Interview Questions
Profile of an Expert
Related Definitions

https://www.sdxcentral.com/industry/career/career-guides/ethical-hacker-career-guide/


Software Engineering Code of Ethics

Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles:

https://www.computer.org/education/code-of-ethics


IEEE CS 2021 Technology Predictions (at the times of pandemics)

The IEEE Computer Society has revealed its 2021 Technology Predictions Report focusing on the pandemic’s impact on human lives, supply chains, workforces, and the unpredictability of operations and markets. The report explores how technology predictions provide important insights that go well beyond hypothetical exercise to yield critical data and planning to help combat the pandemic.

https://www.computer.org/2021-top-technology-predictions


2021’s Top IT Job Skills

Do you have one of the top IT job skills to succeed in the 2021 job marketplace?

If you do, then a new job offer might be in your future. 

https://www.sdxcentral.com/industry/career/skills/2021-top-it-job-skills/


The Top 10 2020 Technology Topics to Know

The COVID-19 pandemic that defined so much of 2020 had an undeniable impact on IT technology.

Secure access service edge (SASE) technology received so much attention because of its distributed approach to security. Telecoms continued deploying 5G networks despite many logistical challenges brought about by the pandemic. Cyber attacks increased as well, taking advantage of people’s need to stay informed. And of course, the dramatic and rapid shift to a remote workforce brought another layer to the security conundrum and strain on network resources.

Below are 2020’s top 10 IT technologies that every IT professional needs to know.

https://www.sdxcentral.com/industry/career/skills/top-10-2020-technology-topics-to-know/


SD-WAN Explained

This post covers:
What is SD-WAN?
Top Benefits of SD-WAN
Choosing an SD-WAN Vendor
Moving to an SD-WAN
SD -WAN Security
The WAN Edge 

https://www.silver-peak.com/sd-wan/sd-wan-explained


How to Destroy Surveillance Capitalism

Surveillance capitalism is everywhere. But it’s not the result of some wrong turn or a rogue abuse of corporate power — it’s the system working as intended. This is the subject of Cory Doctorow’s new book, which we’re thrilled to publish in whole here on OneZero. This is how to destroy surveillance capitalism.

https://onezero.medium.com/how-to-destroy-surveillance-capitalism-8135e6744d59


FAQ on Demat, Mutual Funds (MF) & National Pension Scheme (NPS)

https://www.integratedindia.in/KC_Container.aspx


Website: Data Center Knowledge

Data Center Knowledge is an online source of daily news and analysis about the data center industry. We cover a wide scope. Areas of coverage include advancements in power and cooling technology, processor and server architecture, networks, storage, the colocation industry and data center company stocks, cloud, and developments in modern hyper-scale data center space, edge computing, infrastructure for machine learning, and virtual and augmented reality.

https://www.datacenterknowledge.com


A guide to common variable naming conventions

Every developer should know the basic variable naming conventions to more easily move from language to language. Review the common ones here like Pascal, camel and snake case.

https://www.theserverside.com/feature/A-guide-to-common-variable-naming-conventions


How Low-Code and No-Code Development Accelerates Digital Transformation

Low-code development tools, and their close cousin no code, put user-friendly features such as drag-and-drop interfaces and WYSIWYG editors into the hands of citizen engineers, allowing non-developers such as HR, marketers and operations teams to rapidly develop, deploy and maintain enterprise software applications.

The low-code and no-code approach holds promise to accelerate digital transformation by lowering technical barriers and enabling more teams to innovate and build sophisticated apps without requiring programming knowledge. 

According to research by analyst firm Gartner, more than 50 percent of medium to large enterprises will have adopted a low-code application platform (LCAP) as one of their strategic application platforms by 2023, largely due to developer shortages and skill-set challenges.

https://www.reworked.co/digital-workplace/how-low-code-and-no-code-development-accelerates-digital-transformation


Dutch couple move into Europe’s first fully 3D-printed house

New home in shape of boulder is first legally habitable property with load-bearing walls made using 3D-printing technology

https://www.theguardian.com/technology/2021/apr/30/dutch-couple-move-into-europe-first-fully-3d-printed-house-eindhoven


Radical Railways: 15 Technologies that Could Drive the Future of Trains

Innovations in rail travel are seeing trains become faster, safer, more efficient, and more environmentally friendly.

https://interestingengineering.com/radical-railways-15-technologies-that-could-drive-the-future-of-trains


Forthcoming Events
=================

15th May 2021 at 6 pm IST. IEEE CS Madras, ACM Chennai & CSI Chennai jointly present a webinar on "A Garden of Web-based System - Not a Silver Bullet" by Dr. Rajiv Chopra, Associate Professor, Dept of CSE, Guru Tegh Bahadur Institute of Technology, GGSIPU, New Delhi & Author of the book “ Web Engineering”. Register at https://bit.ly/3fwpWlk

ACM India Online Summer Schools 2021 on five different topics during 14 June to 16 July: Shape Modelling, Program Execution, IoT and Embedded Systems (for women only), Natural Language Processing and Programming Language Analysis and Optimizations. Apply on or before: 18 May 2021. For more details at https://india.acm.org/education/acm-india-summer-schools

Asia Pacific Regional Internet Governance Forum (APrIGF)  organises APrlGF-2021 in hybrid mode at Kathmandu, Nepal on the theme: Towards an Inclusive, Sustainable and Trusted Internet during  27-30 Sep 2021. Fellowship applications are open till Fellowship Applications: 27th  May 2021 (Thursday) 23:59UTC.  More details at https://ap.rigf.asia/

More events in May 2021 at  https://bit.ly/3t4mSks
















No comments:

Post a Comment

Pl. post your comments