About Cyber

This author has not yet filled in any details.
So far Cyber has created 30 blog entries.

Hillary vs. Donald: Cyber Security and the President-Elect

    Cyber security has been at the forefront of the U.S. presidential campaign. Not only has Hillary Clinton been in the hot seat for using an unsecured private email server during her time as Secretary of State, her campaign has been the victim of a series of email hacks from WikiLeaks. There have also been concerns [...]

Information Security Challenges and Presidential Politics

In recent years information security challenges have dominated headlines as hacking incidents at companies – such as Home Depot, Target and Anthem – become more prevalent. But 2016 seems to be the year of the political hack. A lack of information security can prove to be debilitating to even the most savvy political campaigns, as career politicians [...]

The Next CSI: Digital Forensics in Cyber Security

"Digital forensics" is a broad term referring to the search for and detection, recovery and preservation of evidence found on digital systems, often for criminal or civil legal purposes. Digital forensics can sometimes involve the acquisition of evidence concerning events in the physical world — for example, recovering deleted emails that link a suspect to [...]

Combating Cyber Crime: Why You Need a Master’s Degree

The number of attacks against private businesses and governments is now reaching fever pitch, with the total cost of cyber crime set to reach $2 trillion by 2019. In the past, hackers have been able to exploit a lack of knowledge among companies' IT departments around how to best combat these threats. That's now changing. Today's schools, universities [...]

Top Cyber Security Threats That Hackers Love

Cyber security threats are becoming all to common and with each passing day, malicious hackers become smarter and more agile in their tactics. You don’t have to look far these days to find cyber security news of hackers, cyber criminals and other hostile agents successfully compromising computer networks and breeching data systems for their own [...]

A Cyber Security Trick: Don’t Fall Victim This Halloween

Halloween may be the one night in the year when ghouls, ghosts and goblins routinely roam the streets, but in the brave new online world a litany of cyber security threats  are constantly lurking just beneath the surface. A cyber security trick is certainly not a treat, and something no one wants to fall victim to [...]

2016-12-16T16:14:58+00:00 Categories: Cybersecurity, News|0 Comments

The 5 Leading Women Shaping the Cyber Security Sector

Cyber security is a high-demand field. There may be as many as a million job openings in cyber security worldwide. Postings are up 74 percent over the past five years. This also means there is a huge opportunity for women in this field. Women hold a quarter of all computing jobs in the U.S. and just 11 percent of cyber security jobs, says [...]

2017-07-26T18:24:59+00:00 Categories: Experts, Women|Comments Off on The 5 Leading Women Shaping the Cyber Security Sector

Why Smart Cyber Professionals Earn Their Cyber Security Degree Online

Cyber security is one of the fastest-growing technology fields and companies are desperately seeking top talent to fill a range of positions. This growth has sparked many seasoned professionals to pursue a cyber security degree, and accredited online programs continuously rise to the top of the short list. Job openings in the field have grown three [...]

Are There Enough Women in Cybersecurity?

The first computer programmer was a woman –­ Ada Lovelace. Ida Rhodes designed the first computers to run the U.S. Census and Social Security systems. Margaret Hamilton wrote software that got Apollo 11 on the moon. Where are the women in cybersecurity? Despite the pivotal role these founding mothers played in the technology industry, the [...]

What You Need to Know: Risks of Cloud Services

Cyber crime costs the average U.S. company $15.4 million each year. Despite this, many companies are still lagging when it comes to protecting their data and cloud applications from cyber security threats including cloud cyber security threats. Organizations of all kinds have been eager to introduce and explore the benefits of cloud computing and storage. These [...]