Research Report: Social Media a Top Cybersecurity Challenge in the Workplace By Rhea Kelly 09/01/16 Safe social media use is the top cybersecurity challenge for employees, according to the latest report from Wombat Security Technologies on security awareness issues in enterprise organizations. The 2016 Beyond the Phish Report evaluated two years of assessment data from […]

by

Set the ground rules Before things get out of hand, set the ground rules in reporting, making recommendations, identifying inefficiencies, inaccuracies or insufficiencies and providing guidance. Recommendations for the cybersecurity program are just that — recommendations. The cybersecurity expert can bring them up as appropriate but the decision to deploy should be based on consensus […]

by

Hardiman, a man-augmentation system built for the Navy, had thirty powered joints and could lift its own weight plus 1,500 pounds. The exoskeleton prototype mimicked natural human emotions and provided “feel” through touch sensors. Work was cancelled in 1971. Photo from “Rise of the Machines: A Cybernetic History” by Thomas Rid. Copyright ©2016 by Thomas Rid. […]

by

The Metropolitan Zoological Park and Museum District board wants to study cyber security at its five member institutions as well as explore ways to save on purchasing. The board unanimously decided Tuesday to seek bids from consultants, with the cyber security consultant applications due by Oct. 14. Study proposals for how to share and reduce […]

by

Purdue University Northwest graduate Nathan Ecker recalls his interest in computers began when he was child, so it was a natural fit for him to earn a bachelor’s degree in Computer and Information Technology. A member of the Westville campus’ 2016 graduating class, Ecker also earned a bachelor’s degree in Business with a concentration in […]

by

The G20 summit will kick off Sunday in the Chinese city of Hangzhou. Ahead of the summit, a group of research institutes from the Asia Pacific region have gathered in Beijing to discuss internet trends in the world’s largest economies. Delegates also held talks on cyber space cooperation projects and ways to safeguard information online. […]

by

August 31, 2016 China has signaled an interest in a global approach to developing the country’s cybersecurity standards for foreign technology companies. China appears to have taken a more global approach to discussions involving the country’s cybersecurity standards. For the first time, the country has allowed foreign technology companies to participate in creating cybersecurity standards, […]

by

With sophisticated hackers targeting everyone from Sony and Target to the Pentagon and State Department, the demand for skilled workers in cybersecurity has skyrocketed in recent years. Forbes magazine reports cybersecurity jobs are up 74 percent since 2007. The jobs are not only plentiful, they are high paying, offering a median salary of $116,000 – […]

by