About Amy

This author has not yet filled in any details.
So far Amy has created 35 blog entries.

In Cybercrime Fight, CIA Hacking Isn’t a Big Worry – Simple Mistakes Are

When reports surfaced recently that U.S. federal agencies have the ability to spy on ordinary users via phones, TV sets and other online devices, outrage over "CIA hacking" sounded across the web. But why were so many people surprised? Global cybercrime makes headlines with increasing regularity, from the now-infamous Target breach in 2013 to the newly discovered hack of 1 billion Yahoo accounts (the [...]

2017-06-30T23:13:36+00:00 Categories: Cybersecurity, News, Uncategorized|Tags: , , , |Comments Off on In Cybercrime Fight, CIA Hacking Isn’t a Big Worry – Simple Mistakes Are

The Top Cybersecurity Education Trends You Need to Know with Jessica Gulick

Jessica Gulick has not only witnessed the cyber security industry's astonishing growth, she’s played an integral role in the development of the next era of its professionals. As the vice president of the Women’s Society of Cyberjutsu, a non-profit that empowers women to succeed in cyber careers, Jessica encourages women to build their technical skills [...]

2017-05-26T19:46:25+00:00 Categories: Education|Tags: , , , , , |Comments Off on The Top Cybersecurity Education Trends You Need to Know with Jessica Gulick

The Future of Cybersecurity Education: Craig McDonald Weighs In

Cybersecurity education and training is becoming even more important as threats continue to multiply. Cybersecurity expert and leader Craig McDonald believes that all IT professionals should invest in cybersecurity education. Craig McDonald founded Australian cybersecurity company MailGuard in 2001 after a cyber attack caused havoc on a previous business. More than 15 years later, MailGuard is now the world’s [...]

2017-05-26T19:32:16+00:00 Categories: Cybersecurity|Tags: , , , |Comments Off on The Future of Cybersecurity Education: Craig McDonald Weighs In

Protecting the Underdog: Cyber Crime and the Small Business

Many small businesses don’t believe they have anything that cyber criminals might want to steal. Yet these companies are at as great a risk as others, if not greater. Cybersecurity professionals can help small companies take the necessary steps to protect their data and safeguard their customers’ valuable data. Cybersecurity should be a key concern [...]

2017-04-18T21:14:22+00:00 Categories: Cybersecurity|Tags: , , , |Comments Off on Protecting the Underdog: Cyber Crime and the Small Business

Best Paying Cybersecurity Jobs and Where to Find Them

What salary could you get from your next, or first, cybersecurity job? The salary expectations and opportunities are different in various locations for the best paying cybersecurity jobs in this rapidly expanding sector. Cyber crime is on the rise, with the cost of data breaches estimated to reach $2.1 trillion globally by 2019. In response, the number of cybersecurity jobs grew 75 percent (twice [...]

2017-05-26T20:28:35+00:00 Categories: Cybersecurity|Tags: , , , |Comments Off on Best Paying Cybersecurity Jobs and Where to Find Them

Information Security Is Key for Autonomous Cybersecurity Defense

The Need for Better Information Security The emerging future of military cyber information security technology involves machines that can self-direct, self-protect and self-evolve but what are the risks and benefits? More importantly, could these weapons be turned against us? As automation advances, IT and cybersecurity professionals are securing and protecting more technologies and industries than ever [...]

2017-06-05T17:53:40+00:00 Categories: Cybersecurity|Tags: , , , |Comments Off on Information Security Is Key for Autonomous Cybersecurity Defense

Digital Warfare: Are State-Sponsored Cyber Attacks the Wave of the Future?

Countries have to do more than protect their borders these days; they have to protect their databases. State-sponsored cyber attacks are on the rise, and improving cybersecurity isn’t just about privacy — it’s about national security. It’s no secret that state-sponsored cyber attacks are prevalent throughout the world, and indications suggest they’re only going to increase. From Russia hacking into the Democratic [...]

2017-04-18T20:39:11+00:00 Categories: Cybersecurity|Tags: , , , |Comments Off on Digital Warfare: Are State-Sponsored Cyber Attacks the Wave of the Future?

The Big Five Cybersecurity Risks Facing Smart Cities

Today’s smart cities may be underprepared for a range of cybersecurity risks, and must address key vulnerabilities before hackers exploit them. As cities rapidly deploy connected devices and big data to create “smart” networks, from sophisticated mass transit networks to computerized water supply systems, they are becoming increasingly vulnerable to cyber attacks. That’s because many [...]

2017-05-26T21:00:30+00:00 Categories: Cybersecurity, Uncategorized|Tags: , , , |Comments Off on The Big Five Cybersecurity Risks Facing Smart Cities

Cybersecurity Career Advancement: How to Rise Through the Ranks in Cybersecurity

Many people studying information security want to know about cybersecurity career advancement. Find out how you can rise through the cybersecurity ranks and where a degree in the field could take you. Advancing through a cybersecurity career can seem like a daunting task, but like any other career, there are steps you can take to make your way up the ranks. [...]

2017-05-26T19:51:04+00:00 Categories: Careers|Tags: , , |Comments Off on Cybersecurity Career Advancement: How to Rise Through the Ranks in Cybersecurity

Web Encryption 2.0: A Q&A with Security Expert Scott Helme

Is web encryption just for sites with sensitive data? Security expert Scott Helme explains why every site needs this layer of cybersecurity, and how the industry is quickly adopting it. According to recent reports, about half of all web traffic is encrypted, providing a layer of protection for users. Google even announced that 77 percent of its traffic is encrypted. While the rate of web [...]

2017-06-05T17:31:38+00:00 Categories: Experts|Tags: , , , |Comments Off on Web Encryption 2.0: A Q&A with Security Expert Scott Helme