Cybersecurity and Tesla Hack
Tesla hacked...again By Charles Parker This is from the “What will they think of next” file. Imagine you have just purchased your dream...
Cybersecurity and Free Software
Free software with a side of malware by Charles Parker We all like free software. We find what we want on the internet and download it....
Cybersecurity and International Health Services
Pwned: International Style by Charles Parker Hospitals provide a plethora of data. The attackers could target hospital and/or patient...
Cybersecurity and Embedded Systems
The need to secure embedded systems Charles Parker Do you drive a car? have you in the last five years flown on an airplane? Have you...
Cybersecurity and Military Autonomous Vehicles
Security isn’t just for the consumer vehicle market by Charles Parker Vehicles continue to be targeted by malicious attackers and...
Cybersecurity and Critical Infrastructure
Dr. Jane LeClair The recent cyber attack on the Colonial Pipeline has created a good deal of disruption in the lives of people in the SE...
Cybersecurity and Data Science
How can data science assist cybersecurity? -Charles Parker, II Cybersecurity has tended to be siloed from other areas. When other areas...
Cybersecurity and Women
The facts speak for themselves...there are literally hundreds of thousands of unfilled cybersecurity positions, there is expected to be a...
Cybersecurity and Smart Cities
Who is responsible when the smart city crashes? Charles Parker, II Society is becoming ever-more connected on a daily basis. Consumers...
Cybersecurity, Ransomware and Tyler Tech
In this day and age, everyone and business is a target. If you have data, or your operation can be leveraged by shutting people out,...

