In 2013, Edward Snowden changed the way many of us think about internet security. Whether you love him or hate him, Snowden dropped a truth bomb on the world. He made us realize that several government agencies are reading your emails and text messages, listening to your phone calls and browsing your private pictures on your phone, all for the purpose of keeping you safe from terrorists.
By Wes O’Donnell
There are many choices for prospective students selecting a cybersecurity degree program. However, the National Centers of Academic Excellence in Cyber Defense is a designation that sets schools apart.
By Dr. Kenneth Williams
Is the best way to protect against a hacker to hire one? Find out why some organizations are paying “white-hat hackers” to test their network’s protections and what you need to consider before hiring one.
By Angela Hill
Companies that deal with critical infrastructure are prime targets for foreign adversaries looking to collect valuable data. Employees at these companies should follow these tips to ensure they’re not being used as unsuspecting sources.
By Dr. Harry Cooper
Information breaches are often caused by personnel who unintentionally allow hackers to access private networks. Learn about ransomware and other methods hackers are using to mislead business employees and steal sensitive data.
Losing critical data can be devastating to an organization. This cybersecurity awareness month, all business leaders should evaluate the security measures they have in place to protect against a potential cyberattack. Download this magazine to learn what digital assets are most likely to be targeted by hackers, how to make sure employees are cyber-ready, and how to prepare contingency plans for a worst-case scenario.
America’s entire stealth program is built upon the principle of absorbing radio waves with special materials so they don’t reflect signals back to an adversary’s radar system. In that way, America’s stealth warplanes like the F-22 Raptor, F-35 Lightning, and B-2 Spirit can remain relatively invisible on most current radar systems.
By Sam Greif
Public safety leaders do not have to be experts in cybersecurity to ensure their agencies are adequately protected—they just have to know the right questions to ask. This list of questions can help leaders start the conversation with their IT department.