I accepted an invitation from the Michigan Economic Development Corporation (MEDC) to tour the Pinckney Cyber Training Institute, co-located in Pinckney Community High School. I came away impressed by the professionalism of both the students and instructors and left convinced that the future of cybersecurity is in great hands.
Traditionally, for an environment to be considered secure three primary goals must be met. These goals are commonly referred to as the CIA triad...
Organizational cybersecurity needs to reach the point where its level of effectiveness maintains the proper balance between functionality and security.
When it comes to risk management for an organization, it can be used to leverage multiple solutions to bolster an organization’s security.
A new report from the U.S. Government Accountability Office recently found that U.S. weapon systems developed between 2012 and 2017 have “mission critical” cyber vulnerabilities.
Last Wednesday, the Federal Emergency Management Agency (FEMA) carried out the first successful test of the "Presidential Alert," a text message sent simultaneously to all cell phones nationwide.
October is both National Bullying Prevention Month and National Cyber Security Awareness Month. While many people might not make a connection between these two events, the relationship becomes apparent if you follow certain thought processes.
GSX continues to serve as a networking destination for operational and cybersecurity professionals and executives from around the world.
Ten years ago, we never thought of our mobile devices as being targeted by hackers. But with our increasing reliance on smartphones and tablet computers, cyber crooks have invaded this technology as well.
On September 12, the European Union (EU) passed a law that could severely stifle freedom of expression on the Internet.