1Sep 7, 2016
Note: this is the follow-up to a blog on cyber security and hacking that we posted last month. Earlier this year, the United States government hired a team of hackers to exploit flaws in the Pentagon’s Cyber Systems. A system penetration occurred not once, not twice, but over 130 times. This was part of the […]
2Aug 5, 2016
The United States government hired a team of hackers, instructing them to exploit flaws in the Pentagon’s Cyber Systems. Due to their actions, a system penetration occurred over 130 times. After these “attacks,” the Pentagon will assess the damage and develop countermeasures against them – and then the cycle starts over as the hackers start […]
3May 23, 2016
The next war will not come in the form of military tanks, ships, or bombers. The next war – bound by no physical boundaries – is called the cyber war. A greater dependency on technology is needed to win tomorrow’s fight. This technology provides us and our enemy easy access across each other’s borders (Gargan, […]
4Apr 20, 2016
Today, we are indeed all linked to each other by the Internet; we are using smartphones, tablets, laptops, and desktop computers. The Internet and digital data sharing, is not designed to be secure but to be open and accessible. Accessibility however, comes with threats, risk to data, risk to infrastructure security, and risk to system’s […]
5Mar 2, 2016
Last month a hospital in Los Angeles was the victim of a serious attack. Rather than the type of attack that most people would expect, the Hollywood Presbyterian Medical Center lost access to its email and electronic health records for more than a week due to a cyberattack. This is a serious crime that occurs […]
6Nov 19, 2015
Knowing how to navigate the tech world is essential for success in the professional sphere. For an individual with specialized skills and a deep knowledge of technology and information infrastructure, there are almost no limits on achievement. This blog is inspired by yearly rankings on U.S. News and World Report and includes statistics from the […]
7Sep 7, 2015
Growing out of asymmetric warfare—thanks to advances in technologies—is the cyber battlefield in which sensitive infrastructures are compromised or destroyed by belligerents. Pick up any newspaper or reputable internet news site, and one will read about a blatant cyberattack on a financial institution, a governmental agency, or even the Pentagon. Currently, the U.S. Army Cyber […]