The annual global cyber security contest is open. Those interested in submitting awareness materials may see the National Cyber Security Alliance website for additional information. Three, $250 prizes are being offered for the best submissions.
Monthly Archives: August 2009
A very interesting look at what the FBI is doing to catch the bad guys. Thanks to Kathy Gibson in our MSIT program.
Brad Stone, a reporter with the New York Times, reports on the indictment of what is believed to be the largest single incident of credit card information theft. I say believed to be, because it appears that we really do … Continue reading
When adding a traditional hardware based firewall to a network, major network based surgery is needed a majority of the time. The potential for configuration problems with both internal clients and the router/proxy are increased. There is also overhead that … Continue reading
Take advantage of some free webinars with strategies for advancing your career. A few of the topics include: • Online Social Networking (NEW!) • Teaching in Higher Education • Interviewing for Success • Job Search Strategies for the Mature Worker … Continue reading
Kim Zetter, at wired.com, reports on the ongoing tension between RSA and an information security blogger, Scott Jarkoff, who reported on what appears to be a flaw in the security architecture in the Web site of an RSA client. The … Continue reading
Dr. Brown recently had the opportunity to discuss the value of an online education, and discuss the information assurance programs offered by Capella. If you are interested, please see the following links: From Theory to Practice: The Value of an … Continue reading
Capella University PhD Student Named Director of the Homeland Security Academy; Center for Academic and Agency Outreach Cheryl Seminara, a PhD student in the School of Business and Technology at Capella University, has been named director of the Homeland Security … Continue reading
Robert Lemos of CIO.com addresses the benefits that the cloud provides to organizations in terms of not having to invest in basic IT infrastructure. However, he also identifies some important pitfalls that need to be avoided. One pitfall includes the … Continue reading