In 2016, consumers in the United States lost almost $9 billion due to payment card fraud. Despite continued news of payment card breaches impacting millions …
There are two job openings for every candidate or an estimated one million open cybersecurity jobs, along with zero percent unemployment in the field. In …
Two new networks are the subject of intense research: terahertz networking and nanoscale molecular networking. Both are at the nano-scale and have enormous security implications, …
Mobile devices such as smartphones have replaced Personal Computers (PCs) to become the primary computing devices for many users due to the rapid advance of …
Security awareness training is a proven method used by many companies to help employees gain a better understanding of the information security risks affecting their …
The proliferation of cybersecurity issues over the past decade is challenging the norms of corporate governance. This specific study focuses on three critical areas the …
Information security is rightfully considered a risk management function today as organization’s must align deployed protections to their information security risks and maintain an appropriate …
The European Union’s (EU) General Data Protection Regulation (GDPR) becomes fully enforceable on May 25, 2018. Many small and medium-sized enterprises (SMEs) in the United …
Large organizations with multiple product teams that are geographically spread over many time zones need to ensure that product secrecy and confidentiality is maintained while …
This Critical Challenge Project (CCP) addresses the lack of understanding inherent between private industry and the DoD and argues that not just a whole of …
Cybersecurity incidents are a key enterprise risk for any organization that owns or maintains confidential information and these incidents have the potential to create significant …
As Cybersecurity concerns grow across our interconnected world, companies are required to consider how to best manage Cyber risk and insure business continuity. Given the …
The questionnaire-based assessments of vendors’ cybersecurity posture have proven to be inefficient and ineffective. This single-point-in-time assessment does not capture fully and continuously the cybersecurity …
Vulnerabilities in software are commonplace. They are routinely exploited by bad actors to cause harm and for financial gain. As software is increasingly embedded in …
Small and medium businesses (SMB) comprise approximately 99% of the economy in most developed countries. Because they represent the lion’s share of the economy, their …
In recent years global agriculture has faced adversity; with trials including climate change, water scarcity, loss of arable land, and even workforce shortages. Amidst this …