Cybersecurity and Women
The facts speak for themselves...there are literally hundreds of thousands of unfilled
cybersecurity positions, there is expected to be a shortfall of one million skilled cyber
professionals by the end of the decade and add to those figures the fact that the average salary in
the cybersecurity arena is north of 90k.
However, we have these facts as well...women make up more than 50% of the American workforce, but occupy less than 25% of the positions in IT and less than 10%
Cybersecurity and Smart Cities
Who is responsible when the smart city crashes? Charles Parker, II Society is becoming ever-more connected on a daily basis. Consumers are able to check email from virtually anywhere, including the home, other’s homes, work, when getting coffee, when driving, etc. The portals (Wi Fi) are present in the person’s homes, office building, grocery stores, coffees shops, vehicles, and many other types of locations. This rather not exhaustive list does not even include the person’s
Cybersecurity, Ransomware and Tyler Tech
In this day and age, everyone and business is a target. If you have data, or your operation can be leveraged by shutting people out, which is nearly every business, you are a target. One of these is Tyler Technologies. This is a Texas-based company located in Plano. The company claims to be the largest provider of software and technology services to the public government. The company sells a wide range of services to state and local governments. A few of their products are ap
Cybersecurity and News Releases
News releases are an interesting medium of communication. The business has news-worthy information and wishes to pass it along to everyone interested in one post, in comparison to emailing the information 51k times. This is an economical version for communication, documents the event or announcement, and allows others who might be interested in the future, unbeknownst to the business, to read this at a later time. The question arises though, what if a bad actor wanted to chan
Cybersecurity and Embedded Systems
In InfoSec, there are also embedded systems to consider In InfoSec, most of the focus and attention has been on the enterprise. When students are matriculating or getting certifications, the focus is on the enterprise. Granted, the enterprise is experienced through the business network, laptops, servers, and the infamous data center. One area though which has not received the relative attention it should are the embedded systems. These are present in many of the products we e