A hacker recently tried to poison a U.S. region’s water supply. At what point does a cyberattack constitute an act of war?
There was a time within the Intelligence Community (IC) when the term “open source” referred primarily to materials and media that could be freely accessed
Recent efforts to censor stories, publications, and even individual users may just be the trigger that will change media and the social media landscape.
To criminals, the pandemic is a chance to scam people. Learn about a new vaccine scam that charges people money to make fake vaccine appointments.
Censorship is a dangerous and risky tactic. Learn about many of the popular and successful methods of censorship and the potential damage.
As automated technologies are infused into the weather forecast process, will there be a decrease in the public trust of weather forecasts?
Cybersecurity was once a simple word, much like night watchman, security check-in at the airport or security passwords used to log into company databases and email systems.
Cybersecurity is critical to an organization. In this episode, learn why IT and cyber professionals must have the skills to collaborate with all levels of management and why it’s so important to increase diversity in tech fields.