National Science Foundation targets cybersecurity through Triad scholarships

The National Science Foundation is awarding more than $730,000 in scholarships locally to help tackle the growing concern of cybersecurity. The foundation has awarded $61,000 each to three Forsyth Tech students under its CyberCorps Scholarship for Service program, with a fourth still to be chosen this year. The NSF expects to award four more scholarships […]
Read More »

Viewing Cybersecurity From the Consumer’s Perspective

In recent years, cybersecurity has become a major disrupter across the globe. In a business landscape that depends on digitization and accelerated transactions, cybersecurity is crucial to both providers and consumers. Those consumers must consider cyber resilience when shopping for services or products, even if a vulnerability doesn’t directly affect the device itself. Shifting the […]
Read More »

350% more cybersecurity pros in Washington, D.C., area than rest of U.S.

Two entrepreneurs place a big bet on cybersecurity startups along the Capital Beltway Silicon Valley is home to the largest population of cybersecurity product companies in the world. Sand Hill Road in Menlo Park, California, is the epicenter of technology (and cybersecurity) venture capital. Scores of venture capital (VC) firms dotting the Bay Area have […]
Read More »

Why Is There No Silver Bullet In Cybersecurity?

In the past two years, companies all over the world spent $157 billion on information security products. For comparison, the total expenses of the state government of New York amounted to $150.7 billion in 2016. Just for our amusement, let’s imagine a silver bullet with a cost comparable to information security expenses. It would weigh […]
Read More »

Hacking cybersecurity to anticipate attacks

Imagine two groups at war. One defends every attack as it comes. The other anticipates threats before they happen. Which is more likely to win? In cybersecurity, understanding the potential for attacks is critical. This is especially true for mobile and wireless devices, since they are constantly connected and continuously streaming and collecting data. “We […]
Read More »

TaxSlayer data breach leaves thousands of US financial accounts and tax filings at risk

A third-party vendor may have leaked sensitive data such as social security numbers and passwordsiStock US-based tax preparation firm TaxSlayer has admitted that thousands of user records may have been compromised in a data breach, leaving a slew of financial accounts and tax filings at risk. The breach, blamed on what it has called an […]
Read More »

Moving forward with machine learning for cybersecurity

Cybersecurity professionals see potential in machine learning, but they need education and guidance At Black Hat last week, you couldn’t pass a slot machine without some cybersecurity technology vendor crowing about machine learning or artificial intelligence (AI). Yup, machine learning algorithms have great potential to help with security analytics and employee productivity, but this technology […]
Read More »

This Is One of the Hottest Tech Jobs Right Now

The surge in far-flung and destructive cyber attacks is not good for national security, but for an increasing number of hackers and researchers, it is great for job security. The new reality is on display in Las Vegas this week at the annual Black Hat and Def Con security conferences, which now have a booming […]
Read More »

The Cybersecurity Strategies Governments Need

An effective approach requires integrating proactive, agile defenses deeply into organizations.f there were any doubts about the critical need for governments, businesses and individuals to better fortify themselves against cyber threats, Petya should have put them to rest. The attack a few weeks ago using ransomware known by that name wreaked global havoc, infecting computers […]
Read More »

One easy thing your agency can do to attract more cybersecurity talent

Building a well-trained cyber workforce has been a challenge for the federal government, and the first step in that process is finding well-qualified candidates to fill the positions. Laura Bate, senior programming associate for New America’s Cybersecurity Initiative, said there are several factors that make that the case, but agencies do have options to overcome […]
Read More »