U.S. Companies Need More Authority to Open Covert Channels to Deter IP Theft
By V.S. Subrahmanian, Walter P. Murphy Professor of Computer Science; Buffet Faculty Fellow, Northwestern University This past Friday, November 3,
Read MoreBy V.S. Subrahmanian, Walter P. Murphy Professor of Computer Science; Buffet Faculty Fellow, Northwestern University This past Friday, November 3,
Read MoreBy David Bader, Distinguished Professor and Director, Institute for Data Science, New Jersey Institute of Technology Cybersecurity professionals will not
Read MoreBy Tj Houston, Cyber Security Instructor, Ashland County-West Holmes Career Center Let’s face it, as a society, we are spending
Read MoreBy Charles Harry, PhD, Director, Center for the Governance of Technology and Systems (GoTech), University of Maryland In March of
Read MoreBy Brennan Lodge, Adjunct Professor, Information Technology & Data Analytics, New York University Cybersecurity professionals have long been embroiled in
Read MoreBy Eddie Myers, Crothall Healthcare Director of Cybersecurity (Healthcare Technology Solutions Division) The rapid digitization of the healthcare industry has
Read MoreBy Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce Introduction In today’s interconnected world, where digital
Read MoreBy Nick Janka, Chief Cyber Architect, Lockheed Martin I. CYBERSECURITY VS. CYBER RESILIENCE Cyber resilience, when implemented correctly, enables the
Read MoreCary K. Jim, Ph.D., Data & Analytics Manager, The ASSISTments Foundation With the growing interest in migrating information systems to
Read More