Cybersecurity and Private Data
Data in its various forms have distinct value. The value is to the owner of the data in that if it were to leave the company in an unauthorized manner (insider or external), the liability would be rather substantial. There is a value to the person whose data is described. If a consumer’s data is stolen, they have years and years of issues and worry regarding identity theft. Most pertinent, there is a value to the attacker who has successfully breached the system and secured t
Cybersecurity, Technology and Politics
In the upcoming midterm elections, technology will play an important and increasing role in helping to determine who will be victorious in November. It is not only being used to get a candidates message out to the general public via social media, but to troll the Internet for any tidbit of information that can be utilized for political gain for one candidate or another. Increasingly we also see how hackers are attempting to influence the election by providing information the
Cybersecurity and Women
The facts speak for themselves...there are literally hundreds of thousands of unfilled cybersecurity positions, there is expected to be a shortfall of one million skilled cyber professionals by the end of the decade and add to those figures the fact that the average salary in the cybersecurity arena is north of 90k. However, we have these facts as well...women make up more than 50% of the American workforce, but occupy less than 25% of the positions in IT and less than 10% of
Cybersecurity and Email
By Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development. What you put in your emails is not, repeat, not, safe from prying eyes and kept strictly confidential by those you send to. There was a time when what you wrote in a letter or jotted down in a memo could be tossed in the trash, shredded or burned and it was gone for good. The letter was buried deep in a garbage dump, torn into miniscule pieces or turned to ashes. It was gone...poof
Cybersecurity and Cell Phone Towers
The typical cell phone towers are omnipresent through the countryside and in the cities. In the cities they may be located on parking structures, buildings, in vacant lots, or near buildings. These cell phone towers or base transceiver stations (BST) function to facilitate the communications between the user’s equipment and the network. This communication is the transmitting and receiving of signals. Issue This equipment serves a vital need for society. Nearly everyone is tie