Blog Banner

New Horizons Learning Group Launches IT Apprenticeship Program

 

We are excited to announce our new apprenticeship program in California for aspiring IT professionals, launched in collaboration with the American Institutes for Research (AIR) and CompTIA.

New Horizons Learning Group is the latest organization to join CompTIA Apprenticeships for Tech, a national initiative to help employers fill current and long-term IT staffing needs through an “earn and learn” apprenticeship program that is also creating employment opportunities for people from a diversity of backgrounds.

How Do You Implement a Cybersecurity Strategy?


In today's fast-paced, content-driven world, how do you implement a cybersecurity strategy? Development teams are expected to crank out apps and software at rapid speed. Consequently, cybersecurity often comes last on the list of priorities. This is a dangerous consequence as cybercrime becomes the U.S.' biggest foreign security threat. Cybersecurity teams and development teams tend to work separately, but when working collaboratively, can become a strong defense against bad actors who seek to destroy the software and apps they've worked so hard to create.

Pentagon Requests More Cybersecurity Funding

The Pentagon's request for more funding is $800 million more than what the Pentagon wanted last year and includes investments in zero trust architecture and support to the Defense Industrial Base (DIB). This request also includes adding five cyber mission force teams for a total of 142 teams, according to budget documents.

There is no surprise that they are requesting billions of dollars for cyberspace activities in its fiscal 2023 budget. The need for more funding is for various efforts, including increasing cybersecurity support for defense contractors, hardening its own networks, operationalizing zero trust architecture, and for “cyber ranges” much like rifle ranges, but for all things digital. The Pentagon investing to improve readiness in the nation’s cyber force by funding cyber ranges to enable training and exercises in the cyber domain. Finally, the budget lays the foundation for U.S. Cyber Command to have ownership of the mission and resources of the cyber mission force beginning in FY24 as directed in the FY22 NDAA.

Cybersecurity Skills Gap: What Your Company Can Do


What is the cybersecurity skills gap and what can your company do about it? Certain ramifications of the COVID-19 pandemic will be seared in our minds forever—supply chain disruptions, workforce shortages, and a major shift to virtual work and education. One major effect of the pandemic, though lesser-known, is being felt by I.T. departments in thousands of businesses across the globe.

The threat of increasingly sophisticated cybercriminals is more imminent now than ever as the body of smart devices in the Internet of Things grows and as government agencies, healthcare giants, and academic institutions move to digital, work from home infrastructure, increasing their vulnerability to cyberattacks that could leave the private information of their employees, clients, and stakeholders exposed.

To add to the concern, there's a major skills gap in cybersecurity and it's only expected to grow. Experts predict 3.5 million job openings in cybersecurity by 2025. This cybersecurity skills gap is what prompted Microsoft to launch an international skilling campaign to help the world's businesses fight off ever-advanced cyberattacks. With increasing technical demands and a shortage of qualified workers, it's clear that the one thing organizations should do to stay ahead of cybersecurity threats is invest in high-quality training and certification programs. 

Comply To Connect - The Pentagon's Defense Against Cyber Attacks

By 2025, it is estimated that there will be at least 75 billion connected devices in what is being called the “Internet of Things” (IoT). With advances in microprocessors, sensing devices, and software, pretty soon anything that can be connected will be connected.

Here's What You Need to Remember: Seven years ago, the DoD created Comply to Connect (C2C) as a way to secure its growing array of network endpoints.

The proliferation of devices on the Internet is becoming a tidal wave. In addition to your phone, computer, video game console, and television, the Internet now connects practically everything that has electronics and sensors: household appliances, heating, and air conditioning systems, cars, airplanes, ships, industrial robots, public utilities, home security systems, children’s toys, and medical devices.

RSS
1

Contact author

x

Subscribe for Future Blog Notifications