Blog Banner

AF COOL Program Explained

The Air Force COOL program is a pathway for enlisted Airmen to earn industry recognized professional certifications and licenses. All related licensing fees, exam charges, and study preparation costs, including training, are covered by the Air Force COOL program.

How to Build a Successful Training and Development Program

Employee training and development programs, especially for companies dealing with technology, are vital to staying on top of your industry. According to our 2019 State of IT Training Report, 86 percent of respondents consider maintaining up-to-date skills and knowledge is an important or very important initiative.

But developing talent is easier said than done. Your program must equip employees with the necessary skills to excel while demonstrating business value and a measurable return on investment (ROI). We sat down with President of our own organization, Ryan Landry. to hear from him how to build an employee training and development program that accomplishes your organizational goals.

Robotic Process Automation Enters the DOD's JAIC

Robotic Process Automation technology has found a potential new home with the DOD's Joint AI Center (JAIC). Here's why. (From FedScoop | Written by Billy Mitchell) The Pentagon has never undergone a clean financial audit. In fact, prior to 2018, the Department of Defense had never completed a department wide audit — and in that first exercise, the military’s leadership was not surprised by the results. However, the head of the Pentagon’s new artificial intelligence capability believes AI could play a key role in helping the DOD shore up its accounting and make a clean audit more than just a pipe dream.

The Top 48 Malware Attacks of 2019

The first half of 2019 demonstrated that no environment is immune to malware attacks. We have witnessed threat actors developing new tool sets and techniques, targeting corporate assets stored on cloud infrastructure, individuals’ mobile devices, trusted third-party suppliers’ application and even popular mail platforms.

8 Times Businesses Got Hacked by Not Securing IoT Devices

Many times the threat of not securing IoT devices is not an attack on the device itself, but an attack on the company's larger infrastructure resulting in financial and productivity loss. Gartner claims there are will be over 7 billion connected “things” for business use by 2020. International organizations in particular must now ensure they build security into every new IoT system, or face compliance issues from GDPR and NIS Directive regulators. US firms are going to invest the most in IoT in the coming 12 months: $2.8m. There’s a sizable minority (42%) of organizations involving security teams early on in IoT projects, but conversely the largest number globally (72%) who claim they always define their security needs during projects. However, just 34% said the CISO is ultimately responsible for IoT security, among the lowest worldwide. The company board may discuss the incident recovery plan but have little oversight of the way the company is securing IoT devices in the first place.


Contact author


Subscribe for Future Blog Notifications