A modern vehicle is the most expensive computer that you own, and today’s cars have serious cybersecurity vulnerabilities.
The bad cyber guys are winning, so what can be done? How do we move forward as a society to strengthen information security in the Information Age?
Most IT security professionals agree that integrity means the assurance that data that is either stored or in transit will be changed, manipulated or deleted only by authorized persons or processes.
A rural town in southeastern Michigan – with a population of 2,427 – is developing the next generation of cyber warriors.
Traditionally, for an environment to be considered secure three primary goals must be met. These goals are commonly referred to as the CIA triad…
A new report from the GAO found that U.S. weapon systems developed between 2012 and 2017 have “mission critical” cyber vulnerabilities.
During the Global Security Exchange (GSX) conference hosted by ASIS International this week in Las Vegas, InfraGard’s National Congress took place.
Do you ever feel like someone’s snooping into your life? It’s possible that your smartphone camera was hacked and used without your permission.
By Dr. Chuck Russo and Katherine C. Russo
Direct-to-consumer genealogy testing services have been behind some of law enforcement’s recent cold case breakthroughs. Learn how investigators have successfully utilized these services and how privacy concerns must be incorporated into future considerations.