Click here to close now.




















Welcome!

News Feed Item

CyberSecurity Expert Declares Russian Password Theft Call to Action

Attending CyberSec 2014 Training Session Is More Important Than Ever

COLUMBIA, MD--(Marketwired - August 07, 2014) - Firoozeh Azarbaidjani-Do, co-founder and president of Phoenix TS, the internationally acclaimed and award-winning computer training solution provider, today announced that the recently reported theft of passwords and internet credentials by a Russian crime ring is a call to action among the nation's cybersecurity professionals. "Anyone who has personal data on the web, from personal communications, or from the online purchase of goods or services, is at risk," she said. Some of Azarbaidjani-Do's suggestions for immediate action include adding multi-factor authentication, which is provided by Gmail, Twitter, Facebook, Tumblr, and other websites and, critically, being careful of where consumers plug their information into online.

She continued, "Organizations need to be committed to protecting their web systems from such attacks through close monitoring, penetration testing and thorough investigation if an attack does occur. It's the organization's responsibility to protect their users to the best of their ability and as such employees need to be well versed in today's latest standards of and methods for protection in order to deliver on this promise. Security will always be a concern. That's why we need more knowledgeable and diligent security professionals to increase our odds and continue to play catch up in the cyber war against black hat hackers. It's an excellent example of why attending our Cybersec 2014 training session is more critical than ever." 

CyberSec 2014, the four day training session for IT professionals, held October 14-17 during CyberSecurity month at the firm's headquarters in Columbia, Maryland, will be the leading source of training in standards and protection. The training sessions will provide participants with the latest critical information they need to prevent dangerous security breaches such as this latest episode. The sessions will cover hands-on skills necessary for cyber managers, investigators, defenders and offensive hackers.

Concluded Azarbaidjani-Do, "Without understanding the risks and taking the proper steps you could be at risk for dangerous security breaches that could wreak havoc on everything from companies and customers to power grids and financial systems. For organizations especially, the impact of these attacks is felt long after the incident is reported and often times the financial loss of consumer trust is never fully regained. Don't miss our Cybersec 2014 training session where you can learn how to keep you and your organization safe."

Founded in 1998, Phoenix TS provides quality customized and off-the-shelf, instructor-led technical and end-user training services around the world. The company's management has utilized its more than 30 years of combined experience in training and consulting to provide organizations like DISA, the U.S. Army and the U.S. Air Force with the most effective training possible. The company's instructors have also successfully trained more than 80,000 professionals from nearly every government agency and commercial corporation along with government agencies in foreign countries such as Korea and Germany.

Added Ben Tchoubineh, co-founder, Phoenix TS chief executive officer and CyberSec presenter, "Cybersecurity is one of the most threatening yet least understood issues of our day and we are proud to be recognized as a leader delivering the tools we all need to be secure." 

For more information about CyberSec 2014, visit http://www.cyberseccon.com.

For more information about NCSA, visit http://www.staysafeonline.org/about-us/#sthash.lZkb6GwL.dpuf

The following files are available for download:

Jackie Clark
Spokesperson for Phoenix TS
Tel: 301-641-3750

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies leverage disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advance...
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Akana has announced the availability of the new Akana Healthcare Solution. The API-driven solution helps healthcare organizations accelerate their transition to being secure, digitally interoperable businesses. It leverages the Health Level Seven International Fast Healthcare Interoperability Resources (HL7 FHIR) standard to enable broader business use of medical data. Akana developed the Healthcare Solution in response to healthcare businesses that want to increase electronic, multi-device acce...
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
SYS-CON Events announced today that the "Second Containers & Microservices Expo" will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
It’s been proven time and time again that in tech, diversity drives greater innovation, better team productivity and greater profits and market share. So what can we do in our DevOps teams to embrace diversity and help transform the culture of development and operations into a true “DevOps” team? In her session at DevOps Summit, Stefana Muller, Director, Product Management – Continuous Delivery at CA Technologies, answered that question citing examples, showing how to create opportunities for ...
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...