News
Virtual Interns Present Final Projects
On Friday, December 7 麻豆视频’s cyber security students presented their final projects in the iQ4 virtual apprenticeship program, under the mentorship of Suman Kalia, Ph.D., assistant professor of cyber security. In the course, students acted as 鈥渃yberinterns鈥 and worked in teams with Dr. Kalia and industry experts as mentors using an online/cloud career focused […]
Horizon Blue Cross Blue Shield of New Jersey Hosts Info Session
This month, Horizon Blue Cross Blue Shield (HBCBS) of New Jersey hosted a healthcare industry forensic investigation information session. Over 35 students attended and learned about the healthcare industry, forensic investigations, protection of infrastructure from threats, demo of tools and applications to protect the infrastructure and career opportunities at HBCBS. This session was conducted by […]
CyberSecurity Bootcamp Hosted at 麻豆视频’s University
麻豆视频’s聽University andCyber Security Aces Bootcamps hosted the CyberSecurity Bootcamp event “Cyber Security Begins At Home” on聽Saturday September 22 Attendees learned how to protect themselves from cyber attacks: credit card protection, personal identity protection, emails, social media networking like LinkedIn, Twitter and Facebook. VPN, Personal Firewall, SSL/TLS, Encryption (Storage & communication), Darkweb Intro, Tor, .onion […]
Cybersecurity Has Some New Changes in Terms of Responsibility
Many cybersecurity experts are claiming that cybersecurity itself is an issue that pertains to the C-suite and board. This challenges the atypical viewpoint of how companies have traditionally treated cybersecurity issues as an IT issue. 鈥淚f you went to a cardiologist, you wouldn鈥檛 want him to work on your brain,鈥 says Richard Frankel, Of counsel […]
The Pros and Cons of Big Data in Cybersecurity
The things that make big data what it is 鈥 high velocity, variety, and volume 鈥 make it a challenge to defend. And it presents a tempting target for potential attackers. But big data technologies are also being used to help cybersecurity, since many of the same tools and approaches can be used to collect […]
Germany Faces ‘Ticking Time Bombs’ in the Form of Cyberattacks
BONN, Germany鈥擨t was a cyberattack that showed just how vulnerable Germany鈥檚 digital infrastructure truly is. In the summer of 2017, a group of hackers infiltrated NetCom BW, a regional telecommunications provider with about 43,000 subscribers in the state of Baden-W眉rttemberg in Germany鈥檚 southwest. Given the company鈥檚 modest size, it may not seem like a prime […]
The Steps of a Cybersecurity Kill Chain: How to Identify and Defend Against It
A kill chain consists of seven identifiable steps聽(as defined by Lockheed Martin) which cyber criminals go through in order to gain access to an organization, typically by compromising a legitimate user. These steps are followed in order to extract useful data from a victim or their organization. It’s important to understand how the kill chain […]
Reconsider Cybersecurity: Instead of Malware, Focus on the Data
鈥淚t鈥檚 time to change the way we think about cybersecurity.鈥 That was the message I heard repeatedly in conversations and at keynote addresses at the OpenText Enfuse 2018 conference I attended in May. 鈥淪ecurity isn鈥檛 just around malware anymore,鈥 said Lalith Subramanian, VP of Engineering for Analytics, Security and Discovery with OpenText. 鈥淚t鈥檚 about data […]
A former hacker reveals what he鈥檚 learned about cybersecurity
Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. Eric Taylor, who went by the nickname Cosmo the God, also posted personal information of celebrities and government officials, including Michelle Obama, former CIA director John Brennan, Kim Kardashian and Tiger Woods. […]