Cyber Security bs Resources
Articles

Aug 2017
Career Spotlight: Penetration Tester
Imagine the exhilaration of slyly hacking into secure systems without the fear of repercussion or im… more
Aug 2017
Smart home device security is widely overlooked
Modern society, in the U.S. as well as around the world, now relies on technology more than ever bef… more
Aug 2017
Emerging trends in global cyber crime
Nothing remains static within the world of technology, and cyber security is no different. All aroun… more
Aug 2017
HIPAA Compliance and the Protection of Cyber Security
Network security breaches wreak havoc on healthcare organizations. One hole in a hospital’s cyber … more
Jul 2017
To Password Manager, Or Not To Password Manager
The average person accesses dozens of password-protected websites per day, from banking sites to soc… more
Jul 2017
Genomics Cyber Security Issues
In 2011, former Apple CEO and pancreatic cancer victim Steve Jobs paid about $100,000 to Illumina, o… more
Jul 2017
The Difference Between Cyber Security in Hollywood and Reality
Computer hacking isn't a new concept in the real world or popular culture. According to a retrospect… more
Jul 2017
Blockchain and Bitcoin Offer New Approach, Risks to Cyber Security
Cyber security is now appropriately viewed as a major threat, particularly with regard to its implic… more
Jun 2017
How to Create a Strong Password and Why It’s Crucial
In the arena of cyber security, passwords must serve as the first and front line of defense, for ind… more
Jun 2017
The Basics of a Cyber Security Risk Assessment
The risks present for all businesses and organizations in the digital space are now widely acknowled… more
Jun 2017
Tailored For Cyber Security Graduate Program Admittance
Students pursuing a Bachelors Degree in Cyber Security have chosen their career path wisely. And tho… more
Jun 2017
The Broadening Dimensions Of Data Governance
If to govern something means to bring order to it, then data governance involves the ordering and ma… more
Jun 2017
What We Learned From Infamous Hacking Incidents
As undeniably advanced cyber security has become, in many respects, it's equally impossible to refut… more
Jun 2017
Even with EMV Technology, Are Credit Cards Safe?
The technology underpinning credit card transactions has advanced by leaps and bounds in the decades… more
Jun 2017
A Career In Cyber Security May Provide Job Security
As more and more companies fall victim to cyber attacks, the demand for employees who can manage and… more
Jun 2017
Viral Surveys On Facebook Are Fraught With Risk
In late April 2017, a seemingly innocuous Facebook post went viral. To partake in the fun, Facebook … more
May 2017
Women in Cyber Security: Closing the Gender Gap
For nearly three years, Ann Barron-DiCamillo led the charge to protect the Internet infrastructure t… more
May 2017
Ten Time-Management Apps For Adult Students
For students pursuing an online degree, time is of the essence. Deadlines are apparent and, often ti… more
May 2017
The IoT And Rising Video and Audio Hacking Threats
The term “cyber security” typically calls to mind images of IT professionals furiously typing li… more
May 2017
Businesses Are Seeing Cyber Security Staff Shortages
The state of the cyber security field, for both the public and private sectors, remains uncertain. A… more
May 2017
Why Companies Everywhere Are Boosting Cyber Security Efforts
In the fairly recent past, some companies treated cyber security like a buzzword and didn't take it … more
Apr 2017
Device Disposal And Defending Personal Information
With each passing year, our personal and professional lives become more dependent on digital electro… more
Mar 2017
Best Tools for Identity Management
Identity theft continues to be a rapidly growing crime in the United States despite industry efforts… more
Mar 2017
The Rise of Mobile Attacks and What That Means For You
Mobile devices keep the world more connected than ever. That said, smartphones and tablets can be in… more
Mar 2017
The Ethical Issues Behind Cybersecurity
Since the internet's inception, hackers have labored to exploit it for everything from sophomoric mi… more
Mar 2017
Public WiFi Protection Against Ghost Phishing (And Other Threats)
Public WiFi is a convenient way to stay connected wherever you go, but it can also provide easy acce… more
Feb 2017
Cyber Security and the Internet of Things
The potential of the Internet of Things (IoT) only increases when the infrastructure comes standard … more
Feb 2017
4 Critical Success Factors for Workplace Cyber Security
Companies of any size can be easily taken down without the proper cyber security precautions in plac… more
Feb 2017
Leading Cyber Security Frameworks and Standards
Lloyds Banking Group reports an estimated cost of $400 billion in global cyber attacks annually, and… more
Feb 2017
The Ubiquitous Importance of Cyber Security
According to Forbes, in 2015 the cyber security market was valued at an impressive $75 billion. By 2… more
Feb 2017
Three Cyber Security Issues Organizations Face
Cyber security is a top concern for today’s business owners and technology executives. In fact, a … more
Feb 2017
Wearable Devices and Securing Your Personal Health Information
Wearable health technology has become wildly popular over the past few years. Fitbit®, Apple®, Sam… more
Feb 2017
Ethical Hacking and Morality: The Gray Area
Ethical hacking, better known as “penetration testing,” involves purposeful “hacking” into a… more
Feb 2017
E-Fencing: Who Does It, What It Is And How To Fight It
A fence specializes in the sale of stolen goods, buying from thieves and selling to (often) unsuspec… more
Feb 2017
Three Tips to Protect Yourself Against Data Breaches
There are few situations as unnerving as finding out that you've been the victim of a data breach. A… more
Feb 2017
How to Keep Up With Constantly Changing Cybersecurity Threats
Technology is a consistently evolving field. While this is certainly great for end users who are con… more
Dec 2016
Chip Cards And Security: Technology To Fight Fraud
Credit card fraud is a problem worldwide, but especially in the United States. In 2015, according… more
Nov 2016
Protecting Your Identity and Credit Information During The Holidays
The holiday shopping season is an annual bonanza for consumers, businesses, and the national bottom … more
Jul 2016
Why Top Companies Hire Hackers
PC Mag reports that, in 2011, Facebook welcomed 21-year-old George Hotz onto its development team. W… more
Jul 2016
What You Need to Know About Health Care Cyber Security
According to the U.S. National Library of Medicine, computers have played a role in the health care … more
Jun 2016
Two Technologies Changing Cyber Security
As individuals, corporations and government agencies increasingly store and transmit digital informa… more
Jun 2016
Job Opportunities and Next Steps After You Get Your Bachelor’s in Cyber Security
Great news for students graduating with a bachelor’s degree in cyber security: job opportunities a… more
Jun 2016