Cyber Security bs

Cyber Security bs Resources

Articles

Career Spotlight: Penetration Tester
Aug 2017

Career Spotlight: Penetration Tester

Imagine the exhilaration of slyly hacking into secure systems without the fear of repercussion or im… more
Smart home device security is widely overlooked
Aug 2017

Smart home device security is widely overlooked

Modern society, in the U.S. as well as around the world, now relies on technology more than ever bef… more
Emerging trends in global cyber crime
Aug 2017

Emerging trends in global cyber crime

Nothing remains static within the world of technology, and cyber security is no different. All aroun… more
HIPAA Compliance and the Protection of Cyber Security
Aug 2017

HIPAA Compliance and the Protection of Cyber Security

Network security breaches wreak havoc on healthcare organizations. One hole in a hospital’s cyber … more
To Password Manager, Or Not To Password Manager
Jul 2017

To Password Manager, Or Not To Password Manager

The average person accesses dozens of password-protected websites per day, from banking sites to soc… more
Genomics Cyber Security Issues
Jul 2017

Genomics Cyber Security Issues

In 2011, former Apple CEO and pancreatic cancer victim Steve Jobs paid about $100,000 to Illumina, o… more
The Difference Between Cyber Security in Hollywood and Reality
Jul 2017

The Difference Between Cyber Security in Hollywood and Reality

Computer hacking isn't a new concept in the real world or popular culture. According to a retrospect… more
Blockchain and Bitcoin Offer New Approach, Risks to Cyber Security
Jul 2017

Blockchain and Bitcoin Offer New Approach, Risks to Cyber Security

Cyber security is now appropriately viewed as a major threat, particularly with regard to its implic… more
How to Create a Strong Password and Why It’s Crucial
Jun 2017

How to Create a Strong Password and Why It’s Crucial

In the arena of cyber security, passwords must serve as the first and front line of defense, for ind… more
The Basics of a Cyber Security Risk Assessment
Jun 2017

The Basics of a Cyber Security Risk Assessment

The risks present for all businesses and organizations in the digital space are now widely acknowled… more
Tailored For Cyber Security Graduate Program Admittance
Jun 2017

Tailored For Cyber Security Graduate Program Admittance

Students pursuing a Bachelors Degree in Cyber Security have chosen their career path wisely. And tho… more
The Broadening Dimensions Of Data Governance
Jun 2017

The Broadening Dimensions Of Data Governance

If to govern something means to bring order to it, then data governance involves the ordering and ma… more
What We Learned From Infamous Hacking Incidents
Jun 2017

What We Learned From Infamous Hacking Incidents

As undeniably advanced cyber security has become, in many respects, it's equally impossible to refut… more
Even with EMV Technology, Are Credit Cards Safe?
Jun 2017

Even with EMV Technology, Are Credit Cards Safe?

The technology underpinning credit card transactions has advanced by leaps and bounds in the decades… more
A Career In Cyber Security May Provide Job Security
Jun 2017

A Career In Cyber Security May Provide Job Security

As more and more companies fall victim to cyber attacks, the demand for employees who can manage and… more
Viral Surveys On Facebook Are Fraught With Risk
Jun 2017

Viral Surveys On Facebook Are Fraught With Risk

In late April 2017, a seemingly innocuous Facebook post went viral. To partake in the fun, Facebook … more
Women in Cyber Security: Closing the Gender Gap
May 2017

Women in Cyber Security: Closing the Gender Gap

For nearly three years, Ann Barron-DiCamillo led the charge to protect the Internet infrastructure t… more
Ten Time-Management Apps For Adult Students
May 2017

Ten Time-Management Apps For Adult Students

For students pursuing an online degree, time is of the essence. Deadlines are apparent and, often ti… more
May 2017

The IoT And Rising Video and Audio Hacking Threats

The term “cyber security” typically calls to mind images of IT professionals furiously typing li… more
Businesses Are Seeing Cyber Security Staff Shortages
May 2017

Businesses Are Seeing Cyber Security Staff Shortages

The state of the cyber security field, for both the public and private sectors, remains uncertain. A… more
Why Companies Everywhere Are Boosting Cyber Security Efforts
May 2017

Why Companies Everywhere Are Boosting Cyber Security Efforts

In the fairly recent past, some companies treated cyber security like a buzzword and didn't take it … more
Device Disposal And Defending Personal Information
Apr 2017

Device Disposal And Defending Personal Information

With each passing year, our personal and professional lives become more dependent on digital electro… more
Best Tools for Identity Management
Mar 2017

Best Tools for Identity Management

Identity theft continues to be a rapidly growing crime in the United States despite industry efforts… more
The Rise of Mobile Attacks and What That Means For You
Mar 2017

The Rise of Mobile Attacks and What That Means For You

Mobile devices keep the world more connected than ever. That said, smartphones and tablets can be in… more
The Ethical Issues Behind Cybersecurity
Mar 2017

The Ethical Issues Behind Cybersecurity

Since the internet's inception, hackers have labored to exploit it for everything from sophomoric mi… more
Public WiFi Protection Against Ghost Phishing (And Other Threats)
Mar 2017

Public WiFi Protection Against Ghost Phishing (And Other Threats)

Public WiFi is a convenient way to stay connected wherever you go, but it can also provide easy acce… more
Cyber Security and the Internet of Things
Feb 2017

Cyber Security and the Internet of Things

The potential of the Internet of Things (IoT) only increases when the infrastructure comes standard … more
4 Critical Success Factors for Workplace Cyber Security
Feb 2017

4 Critical Success Factors for Workplace Cyber Security

Companies of any size can be easily taken down without the proper cyber security precautions in plac… more
Leading Cyber Security Frameworks and Standards
Feb 2017

Leading Cyber Security Frameworks and Standards

Lloyds Banking Group reports an estimated cost of $400 billion in global cyber attacks annually, and… more
The Ubiquitous Importance of Cyber Security
Feb 2017

The Ubiquitous Importance of Cyber Security

According to Forbes, in 2015 the cyber security market was valued at an impressive $75 billion. By 2… more
Three Cyber Security Issues Organizations Face
Feb 2017

Three Cyber Security Issues Organizations Face

Cyber security is a top concern for today’s business owners and technology executives. In fact, a … more
Wearable Devices and Securing Your Personal Health Information
Feb 2017

Wearable Devices and Securing Your Personal Health Information

Wearable health technology has become wildly popular over the past few years. Fitbit®, Apple®, Sam… more
Ethical Hacking and Morality: The Gray Area
Feb 2017

Ethical Hacking and Morality: The Gray Area

Ethical hacking, better known as “penetration testing,” involves purposeful “hacking” into a… more
E-Fencing: Who Does It, What It Is And How To Fight It
Feb 2017

E-Fencing: Who Does It, What It Is And How To Fight It

A fence specializes in the sale of stolen goods, buying from thieves and selling to (often) unsuspec… more
Three Tips to Protect Yourself Against Data Breaches
Feb 2017

Three Tips to Protect Yourself Against Data Breaches

There are few situations as unnerving as finding out that you've been the victim of a data breach. A… more
How to Keep Up With Constantly Changing Cybersecurity Threats
Feb 2017

How to Keep Up With Constantly Changing Cybersecurity Threats

Technology is a consistently evolving field. While this is certainly great for end users who are con… more
Chip Cards And Security: Technology To Fight Fraud
Dec 2016

Chip Cards And Security: Technology To Fight Fraud

Credit card fraud is a problem worldwide, but especially in the United States. In 2015, according… more
Protecting Your Identity and Credit Information During The Holidays
Nov 2016

Protecting Your Identity and Credit Information During The Holidays

The holiday shopping season is an annual bonanza for consumers, businesses, and the national bottom … more
Why Top Companies Hire Hackers
Jul 2016

Why Top Companies Hire Hackers

PC Mag reports that, in 2011, Facebook welcomed 21-year-old George Hotz onto its development team. W… more
What You Need to Know About Health Care Cyber Security
Jul 2016

What You Need to Know About Health Care Cyber Security

According to the U.S. National Library of Medicine, computers have played a role in the health care … more
Two Technologies Changing Cyber Security
Jun 2016

Two Technologies Changing Cyber Security

As individuals, corporations and government agencies increasingly store and transmit digital informa… more
Job Opportunities and Next Steps After You Get Your Bachelor’s in Cyber Security
Jun 2016

Job Opportunities and Next Steps After You Get Your Bachelor’s in Cyber Security

Great news for students graduating with a bachelor’s degree in cyber security: job opportunities a… more
Industries Still Lagging Behind in Cyber Security
Jun 2016

Industries Still Lagging Behind in Cyber Security

With the increased threat of cyber crimes, industries across the country are becoming more aware of … more