article thumbnail

Enhancing Maritime Security: Lessons from the Key Bridge Incident

SecureWorld News

The ship had lost power, and after briefly regaining power, a second loss of power left the ship's system's "blinded and lame," losing control and unable to navigate a course to maintain distance from the bridge's structural support. What is the feasible course of action to protect our maritime system? So many questions!

article thumbnail

IT leaders get creative to fill data science gaps

CIO Business Intelligence

For the past few years, IT leaders at a US financial services company have been struggling to hire data scientists to harness the increasing flood of incoming data that, if used properly, could improve customer experience and drive new products. Gary Jeter, executive vice president and CTO, TruStone Financial Credit Union.

CTO Hire 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to manage cloud exploitation at the edge

CIO Business Intelligence

Companies that have embraced the cloud need to understand the Shared Responsibility Model: a security and compliance framework that explains what shared infrastructure and systems the cloud provider is responsible for maintaining and how a customer is responsible for operating systems, data, and applications utilizing the cloud.

Cloud 98
article thumbnail

Jeff Bezos to hand over Amazon CEO role to Andy Jassy on July 5, anniversary of company’s creation

GeekWire

Amazon’s record 2020 results of $386 billion in net sales and $23 billion in operating profits, as noted in a presentation by Brian Olsavsky, chief financial officer, were almost an afterthought. Think about mobile phone operating systems. And the IT industry too, of course, is thriving. Where are they?

Retail 144
article thumbnail

Malvertising Is a Cybercrime Heavyweight, Not an Underdog

SecureWorld News

Cybercriminals can then exploit the compromised device for various purposes, such as stealing personal information, conducting financial fraud, recruiting it into a botnet, or encrypting data and holding it for ransom. Of course, good old vigilance won't go amiss. If an ad feels too good to be true, think twice before clicking it.

article thumbnail

LEOcloud, Microsoft team up with Axiom Space to put cloud infrastructure in orbit

GeekWire

. “Red Hat is excited to be working with LEOcloud in this latest collaboration to deliver open hybrid cloud computing to the next frontier with edge computing,” said Francis Chow , Red Hat’s vice president and general manager for in-vehicle operating system and edge. Why put the cloud in space?

Microsoft 119
article thumbnail

Employee Training Platform: 8 Best Features of an Employee Training Platform

Kitaboo

While an employee training platform may offer you a complete library of content resources, tools, and courses, you will still need to make some modifications to the system to meet your needs. This is especially important for employees on the move and on a very tight schedule and need flexibility while taking a course.