By Andrew Bell and Bruce Razey
Is creating fake news a crime? Learn how law enforcement is addressing potential threats posed by the spread of false information and the connection to cybercrime. Are officers properly trained for this fight?
By Andrew Bell and Bruce Razey
Is creating fake news a crime? Learn how law enforcement is addressing potential threats posed by the spread of false information and the connection to cybercrime. Are officers properly trained for this fight?
By Dr. Kevin Harris
Leaders must know how to protect an organization’s digital assets from hackers. Taking steps to create a total asset matrix will help them identify valuable assets, evaluate the threat associated with each one, and protect them accordingly.
Foreign governments are continuously conducting covert operations in the U.S. to gather intelligence about public and private sector organizations. Learn why it’s so important for business leaders to understand HUMINT and the value of their people and assets.
By Susan Hoffman
One of biggest challenges facing today’s organizations is the insider threat from employees and vendors. Find out what organizations can do to detect employees who may pose a security threat to their computer systems.
By Wes O’Donnell
There are many choices for prospective students selecting a cybersecurity degree program. However, the National Centers of Academic Excellence in Cyber Defense is a designation that sets schools apart.
By Dr. Kenneth Williams
Is the best way to protect against a hacker to hire one? Find out why some organizations are paying “white-hat hackers” to test their network’s protections and what you need to consider before hiring one.
By Angela Hill
Companies that deal with critical infrastructure are prime targets for foreign adversaries looking to collect valuable data. Employees at these companies should follow these tips to ensure they’re not being used as unsuspecting sources.
By Dr. Harry Cooper
Information breaches are often caused by personnel who unintentionally allow hackers to access private networks. Learn about ransomware and other methods hackers are using to mislead business employees and steal sensitive data.
Losing critical data can be devastating to an organization. This cybersecurity awareness month, all business leaders should evaluate the security measures they have in place to protect against a potential cyberattack. Download this magazine to learn what digital assets are most likely to be targeted by hackers, how to make sure employees are cyber-ready, and how to prepare contingency plans for a worst-case scenario.