In January 2013, I noticed I had 7,555 email messages in my Outlook inbox. I remember it, because the number caught my eye and I kept getting alert emails that my account size was close to its limit. You can only ignore those alert emails just so long before, while sending the most important email of your life, you press send and… nothing. You try sending it again. Nothing. That’s what happened to me.
As a cybersecurity enthusiast for years, I am intrigued whenever there is a huge headline-making, media-frenzied security breach. Take, for instance, those two million passwords that were hacked earlier this month from social media sites, including Google, LinkedIn, Facebook, and even my venerable Twitter. At the same time, I am disappointed. The fight against cybercrime is never ending, but winning a battle or two would be nice.
I’m preparing to attend my first IBM conference next week when IBM Information On Demand 2013 begins in Las Vegas. While it’s not the first IBM conference Global Knowledge has attended since becoming an IBM Global Training Provider, it’s the first one I’ll be covering, so be on the look out for my IBM IOD-related blogs next month.
Are you at a crossroads professionally or looking to start training for a new job? If so, you might want to consider pursuing network administration as a career. Network administrators are responsible for maintaining computer hardware and software systems that make up a computer network, including maintaining and monitoring active data networks, converged infrastructure networks, and related network equipment.
No matter which IT conference I attend, I always look forward to hearing Cisco Systems Senior Vice President Chris Young speak on security, if he happens to be on the agenda. I’ve heard the former RSA VP and VMware exec speak at past Cisco Live! and RSA conferences and have never been disappointed. Cisco Live! 2013 in Orlando was no different.
Young started off by sharing what he’s heard time and time again from Cisco customers across the globe. From mobility to BYOD to cloud, most businesses are struggling with diverse IT issues. But how to maintain security and compliance as the IT landscape is constantly changing comes up most. He said staying ahead of the IT security threat landscape – or at least trying to keep up with it is essential. The key is to also handle all the complexities created when we try to manage the combination of those two things.