Linked: The shortage of tech workers is about to become an even bigger problem for everyone
| |

Linked: The shortage of tech workers is about to become an even bigger problem for everyone

The shift in tech skills is one of the contributing factors, but it’s not that technology has been changing, because that ALWAYS happens. It’s the insistence that employers can find people with a skill that didn’t even exist 2-3 years ago instead of actually developing the people they already have, or hiring people who can continue to adjust and learn these skills.

How many jobs are going unfilled because you’re looking for someone with expertise in a technology that has only been around for the last 1-2 years? How do you expect there to be a bunch of experts on this technology? How do you expect recent graduates to be familiar with the technology that their college curriculum hasn’t even caught up to yet?

It’s not possible. So you might want to start adjusting your hiring, recruitment, and staff development processes, because that’s how you shrink the talent gap, by creating the talent yourself.

Apple’s Image Scanning Tool is, Well, Complicated
|

Apple’s Image Scanning Tool is, Well, Complicated

At first blush, the idea of scanning images synced up to iCloud for child sexual abuse materials against the hash list of known CSAM images seems like a good idea. As a survivor of childhood sexual abuse myself, I want tech companies to takes some initiative to deal with this issue. They also want to scan images on kids’ phones using AI to see if kids are getting into any trouble with sending or receiving sexual material. Again, that sounds like a good thing. But, as the EFF points out, this all requires a backdoor, and backdoors, once created, almost never remain used for just one purpose.

Linked: “I’m totally screwed.” WD My Book Live users wake up to find their data deleted
|

Linked: “I’m totally screwed.” WD My Book Live users wake up to find their data deleted

I hope the folks who lost data can somehow get it back. Losing data to a failure of any kind is a pain in the ass. On the other hand, if the ransomware plague has taught us anything, it’s to have backups, online and offline. Because anything connected to the infected device is at risk, but if I have a copy that isn’t connected to anything, it’s safe.

Yes, it’s more work. Yes, it takes time and effort.

So does figuring out how to deal with losing all of your data. 

Linked: Federal Law Won’t Protect Your Organization from Bad User Access Control Practices
|

Linked: Federal Law Won’t Protect Your Organization from Bad User Access Control Practices

If you’ve seen references to a court ruling sort of redefining the Computer Fraud and Abuse Act recently, or even if you haven’t, this paragraph from the folks at McGuire Woods boils down the real life implications pretty well.