Sarah K. White, senior writer at CIO.com, has compiled a list of the seven most needed jobs in IT today, according to Robert Half Technology’s 2018 IT salary report. It’s a quick reveal of the top seven needed positions, their descriptions and requirements, and the range of salaries for each.
Which positions are covered?
* Business Intelligence Analyst
* Data Scientist
* Database Developer
* Help/Support Desk Technician
* Network Administrator
* Data Security Administrator
* System Administrator
So whether you’re new to the job market, considering new IT skills, or looking to hire one of these specialists, this article should be well worth a look.
As many of our readers know by now, blockchain is an architecture that allows users to conduct transactions with each other and create an unchangeable, secure record of those transactions. As such, it has attracted an enormous amount of interest by technologists in finance, healthcare, supply chains, shipping, energy and even election voting.
“The applications are endless,” is a common refrain. Another is “blockchain technology will be the next TCP/IP of finance.”
In this new article, Computerworld senior writer, Lucas Mearian, gives us a three-page course on the current state of blockchain adoption across many industries and a look at the challenges they each face. Finally, he gives us a look at the possible future of blockchain deployments and their role in transforming business practices for efficiency, speed and security.
Recently, the House Science, Space and Technology Committee’s Oversight and Research and Technology subcommittees held a hearing titled, “Leveraging Blockchain Technology to Improve Supply Chain Management and Combat Counterfeit Goods.”
Blockchain momentum is accelerating at even the highest levels among decision-makers. In the House or Representatives hearing, a director with the Department of Homeland Security summed up the sentiment on the future of blockchain technology saying, “The applications are almost limitless.”
Representatives from the shipping and supply chain industries spoke up to agree. Click to get the short scoop or full transcript at Blockchainplusthelaw.com.
Anne Canfield, writing for Blockchainplusthelaw.com, gives us a brief description of why we need new cryptographic advances and a privacy protocol that delivers blockchain’s advantages. She envisions a decentralized social network that uses nodes to sign a smart contract between new ‘friends’ where posts, statuses and pictures are stored and shared with via the InterPlanetary File System (IPFS) network protocol.
More than 80 percent of all data breaches appear to take advantage of stolen or weak password credentials. In this CIOInsight.com article, Brett McDowell discusses the new National Institute of Standards and Technology (NIST) recommendations on “strong passwords” designed to make password creation more secure for everyone.
McDowell explains the three basic types, or levels, of application protection, the vulnerabilities of one-time passcodes (OTPs), and authentication methods the NIST recommends now in light of today’s increasingly sophisticated cyberthreat horizon.
The European Union’s General Data Protection Regulation (GDPR) law, which takes effect on May 25, 2018 – just two months away – imposes a strict set of requirements on how and why companies collect and use the personal data of EU individuals.
For example, this worldwide requirement enables individuals in the EU to limit and control how international businesses collect, process and use their personal information. It allows them to decide what information they share, and it provides individuals with the “right to be forgotten.”
If you currently have EU customer information and don’t comply with the GDPR requirements, you could face fines of €20 million or 4 percent of your global annual revenue, whichever is higher.
If you have EU clients or customers, chances are it will affect you. Read up on GDPR in Adweek this week.
Last month, a bipartisan team in Congress, Dave Trott, D-Michigan and Susan Brooks, R-Indiana, proposed the Internet of Medical Things Resilience Partnership Act. If passed, it will require the Food and Drug Administration to create a working group of cybersecurity experts to recommend voluntary frameworks and guidelines for medical device security.
Cybersecurity is a quickly evolving field, with scads of startups across many categories, from secure communications, predictive intelligence and deception security to IIoT, cyber insurance and investors.
The folks at CBInsights have compiled a clever Periodic Table of companies and categories of service that can give you a quick orientation. The article includes direct links to the leading companies in most of the categories. It’s the 10,000-foot view that is often missing in more narrowly focused articles.
Blockchain technology changes how parties exchange value, and it has practical, efficient, secure benefits for practically every type of industry. This short blog describes its basic benefits in easy-to-understand language.
The Open Web Application Security Project’s (OWASP) Internet of Things Top 10 Project is designed to inform users and security professionals about vulnerabilities in IoT architectures. Here are the top 10 security problems they see and how to prevent them.