1Apr 20, 2016
Today, we are indeed all linked to each other by the Internet; we are using smartphones, tablets, laptops, and desktop computers. The Internet and digital data sharing, is not designed to be secure but to be open and accessible. Accessibility however, comes with threats, risk to data, risk to infrastructure security, and risk to system’s […]
2Apr 15, 2016
Considering entering the disaster management or homeland security field, but not sure of how to go about it? The first step is to review the job requirements, required experience, and degree requirements for a disaster manager position. According to the Occupational Outlook Handbook, employment for disaster managers is projected to grow 6% from 2014 to […]
3Sep 7, 2015
Growing out of asymmetric warfare—thanks to advances in technologies—is the cyber battlefield in which sensitive infrastructures are compromised or destroyed by belligerents. Pick up any newspaper or reputable internet news site, and one will read about a blatant cyberattack on a financial institution, a governmental agency, or even the Pentagon. Currently, the U.S. Army Cyber […]