Nicolas Bettenburg

836 Flips | 9 Magazines | 4 Likes | 6 Followers | @nicbet | Keep up with Nicolas Bettenburg on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Nicolas Bettenburg”

Canada struggling to keep up with demand for cybersecurity talent: report

Canada is suffering from a cybersecurity talent shortage, according to a new report from Deloitte.<p>The report, titled “The changing faces of …

Financial Services

The NSA’s Hidden Spy Hubs in Eight U.S. Cities

The secrets are hidden behind fortified walls in cities across the United States, inside towering, windowless skyscrapers and fortress-like concrete …

Surveillance

Meet the teens being groomed as the future of cyber security

Closed Captioning<p>ON<p>OFF<p>apply | reset x<p>font<p>size<p>color<p>Play Video - 6:00<p>June 29th, 2018<p>The new head of U.S. Cyber Command at the National Security Agency says he is prioritizing recruiting cyber security professionals, a profession experts say the world could soon see a shortage of. Now, a group of high …

Cybersecurity

How to improve your web design workflow

As a freelancer in the field of web design or development, you are well aware that time is money. When you are able to get a great deal of work done …

Web Design

5 Sure Signs That Your Workplace Is the Opposite of Toxic

Daniel Lubetzky, Kind founder and CEO, is a model example for leading human-centered workplaces that thrive.<p>A growing body of research on employee motivation affirms the need for companies to create more human workplaces that lead to positive experiences.<p>And the responsibility falls on senior …

Employee Engagement

LTE wireless connections used by billions aren’t as secure as we thought

LTE was supposed to fix security and privacy shortcomings—now it's broken, too.<p>The Long Term Evolution mobile device standard used by billions of …

Information Security

Google Is Building a City of the Future in Toronto. Would Anyone Want to Live There?

It could be the coolest new neighborhood on the planet—or a peek into the Orwellian metropolis that knows everything you did last night.<p><b>TORONTO—Even with a chilly mid-May</b> breeze blowing off Lake Ontario, this city’s western waterfront approaches idyllic. The lake laps up against the boardwalk, …

smartcities

Four ways managers subconsciously sabotage their own teams

Your role as a manager is to empower your employees to do their jobs well, but a few well-meaning habits can get in the way.<p>Mean, self-interested, and toxic bosses aren’t the only obstacles employees face on the job. Even the best-intentioned managers can unwittingly get in their team members’ way …

Employment

Top Differences Between Artificial Intelligence, Machine Learning & Deep Learning

<b>Artificial intelligence</b> is the future of the technological football and now some of the world’s most advanced artificial intelligence and machine …

Machine Learning

Black Hat 2018 – What cybersecurity pros really think (and it is not good)

Black Hat 2018 is over. Its post-conference survey of the world’s leading cybersecurity experts is telling.<p>You can read the 30-page report here. …

Cybersecurity

How To: Use Beginner Python to Build a Brute-Force Tool for SHA-1 Hashes

Developers creating login systems know better than to store passwords in plain text, usually storing hashes of a password to prevent storing the …

Python Programming

Adidas Website Hacked, Millions of US Customer Details Stolen

On Tuesday, Adidas discovered that its US website had been hacked and an unauthorized party had accessed customers data. Millions of customer records …

Identity Theft

The world’s biggest database of hacked passwords is now a Chrome extension that checks yours automatically

Choosing a strong password is an essential move in guarding against hackers. But even if your password checks all the right boxes, you still may be using one that’s been breached—or one that’s been used so often that it’s one of the most common for hackers to try.<p>That’s more common than you might …

Chrome Browser

YubiKey: Protect your Facebook, Google, and other online accounts with this hardware authentication key

YubiKey offers a faster and more convenient alternative to text-messages or authenticator app two-factor authentication.<p><i>This USB thumb drive is one</i> …

The Harvard Business Review Entrepreneur's Handbook: Everything You Need to Launch and Grow Your New Business

Description<p>Publication Date: <b>February 13, 2018</b><p>The one primer you need to develop your entrepreneurial skills. Whether you're imagining your new business to be the next big thing in Silicon Valley, a pivotal B2B provider, or an anchor in your local community, the "HBR Entrepreneur's Handbook" is your …

The Seven Phases of a Cyber Attack

In the cyber security industry, we are seeing a change in the way that hacks are being performed.<p>A recent set of attacks against critical …

Blockchain is crappy technology and a bad vision for the future

This December I wrote a widely-circulated article on the inapplicability of blockchain to any actual problem. People objected mostly not to the technology argument, but rather hoped that decentralization could produce integrity.<p>Let’s start with this: Venmo is a free service to transfer dollars, and …

20 Killer Copywriting Tips for Startups

<b>How to Create Stronger Customer Relationships and Sell More With Your Business Copy</b><i>These copywriting tips for startups are designed to help you</i> …

Marketing

Top Free eBooks for Web Designers & Web Developers

by Bradley Nice, Content Manager at ClickHelp.co — help authoring tool<p>Web design and web development are the niches that are extremely popular …

What is the math behind elliptic curve cryptography?

Introduction<p>When someone sends bitcoin to you, they send the bitcoin to your address. If you want to spend any of the bitcoin that is sent to your …

Salesforce CEO Marc Benioff: How to be successful when the world thinks you'll fail

Salesforce, a 19-year-old cloud software company worth $85 billion that has 30,000 employees, brought in $10 billion last year and hopes to have $60 billion in revenue by 2034.<p>But success in Salesforce's early days was hardly a given, its founders, Marc Benioff and Parker Harris, told me during an …

Animatron lets you create awesome videos with little know-how

popsci shop<p>Get lifetime access to this animation studio for $49.99.<p>When you have something to sell or a message to get across, video is your friend. Animatron Studio Pro is an innovative platform that lets you create captivating animations without any special design skills. Used by the likes of …

India just cracked down on cryptocurrency. Hard.

Indian officials are not here for your cryptocurrency games.<p>Government officials with the Reserve Bank of India announced on Thursday that, effective …

Cryptocurrency

IDG Contributor Network: 3 mistakes we made moving to a microservices architecture

My company, CircleCI, is a big believer in the blameless postmortem—the idea that when you discuss a project and take emotion out of the picture, you …

Your Strategic Plans Probably Aren’t Strategic, or Even Plans

It happens all the time: A group of managers get together at a resort for two days to hammer out a “strategic plan.” Done and dusted, they all head home. But <i>have</i> they produced a plan with a strategy?<p>At the start of my public seminars on strategic planning I ask attendees, who rank from board …

Management

My Linux Development Environment of 2018 - DEV Community 👩‍💻👨‍💻

In this blog post I will talk a bit about the setup and software of my personal laptop, powered by Linux. This is somewhat inspired by this post, but …

Command-line

How To: Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack Using Airgeddon

Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this …

Wi-Fi

How To: Stealthfully Sniff Wi-Fi Activity Without Connecting to a Target Router

Identifying vulnerable devices and services on a target network can be difficult without leaving traces behind since hackers primarily attack the …

Information Security

19 Interview Questions That Cut Through the BS to Reveal a Great Hire

Employee turnover is downright costly. A great way to avoid it is to ask the right questions in the interview process.<p>I hate to start on a grim note, but it's necessary. Bringing in a few bad apples because of a lack of due diligence in the hiring process can be very costly (and inexcusable). Check …

Emotional Intelligence

It's official: Russia is targeting critical American infrastructure with 'malicious cyberattacks'

Russian cyber operatives are attacking critical American infrastructure such as energy grids, nuclear facilities, aviation systems, and water processing plants, according to the Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS). The report details numerous attempts, …