September 2016

One of the members of panel who will be working with the Department of Homeland Security to ensure the cybersecurity of American elections recently oversaw a data breach of millions of private Social Security numbers. The National Association of Secretaries of State named four state officials who serve in that role to DHS’s Election Infrastructure […]

by

The recent announcement from Dropbox Inc. that millions of its users had their login information compromised in a 2012 hack was the latest reminder of the vulnerabilities that exist online and the need to take protective measures. But while people may be confused about how to safeguard themselves against the wave of such attacks, the […]

by

Research Report: Social Media a Top Cybersecurity Challenge in the Workplace By Rhea Kelly 09/01/16 Safe social media use is the top cybersecurity challenge for employees, according to the latest report from Wombat Security Technologies on security awareness issues in enterprise organizations. The 2016 Beyond the Phish Report evaluated two years of assessment data from […]

by

Set the ground rules Before things get out of hand, set the ground rules in reporting, making recommendations, identifying inefficiencies, inaccuracies or insufficiencies and providing guidance. Recommendations for the cybersecurity program are just that — recommendations. The cybersecurity expert can bring them up as appropriate but the decision to deploy should be based on consensus […]

by

Hardiman, a man-augmentation system built for the Navy, had thirty powered joints and could lift its own weight plus 1,500 pounds. The exoskeleton prototype mimicked natural human emotions and provided “feel” through touch sensors. Work was cancelled in 1971. Photo from “Rise of the Machines: A Cybernetic History” by Thomas Rid. Copyright ©2016 by Thomas Rid. […]

by

The Metropolitan Zoological Park and Museum District board wants to study cyber security at its five member institutions as well as explore ways to save on purchasing. The board unanimously decided Tuesday to seek bids from consultants, with the cyber security consultant applications due by Oct. 14. Study proposals for how to share and reduce […]

by

Purdue University Northwest graduate Nathan Ecker recalls his interest in computers began when he was child, so it was a natural fit for him to earn a bachelor’s degree in Computer and Information Technology. A member of the Westville campus’ 2016 graduating class, Ecker also earned a bachelor’s degree in Business with a concentration in […]

by

The G20 summit will kick off Sunday in the Chinese city of Hangzhou. Ahead of the summit, a group of research institutes from the Asia Pacific region have gathered in Beijing to discuss internet trends in the world’s largest economies. Delegates also held talks on cyber space cooperation projects and ways to safeguard information online. […]

by