Cybersecurity Center Article Archive

The Cybersecurity Center at Purdue Global has compiled a list of cyber defense articles. Read on to learn more about current trends and challenges in the cybersecurity industry.

94% of Executives Want Legal Action on Software Vendors Who Neglect Data Security: Report

September 14, 2021

A report by cybersecurity company Venafi shows that most executives feel software vendors who fail to protect software should face consequences. Many have recognized the vulnerability of their supply chains, though the survey also identified no new developments in protecting said chains.

Cyber Threats Still Leading Concern for Businesses—Report

September 14, 2021

Specialist insurer Beazley has released a report indicating that businesses’ primary concern remains cyber threats. The persistence of COVID-19 has opened new opportunities for disruption by competitors and cyber criminals.

Business Leaders Can Make Big Mistakes About Cyber Security

August 24, 2021

Dealing with the enormous challenges posed by COVID-19 and converting to remote work has caused several businesses to have to change their cybersecurity stance to incorporate every employee.

Detecting and Mitigating Cyber Attacks

August 23, 2021

Identity protection is becoming a key component of protection against cyberattacks, as an increasing number of incidents involve compromising identity systems.

Things That Are Easy to Miss in the Race Towards Hybrid Working and the Cloud

August 23, 2021

Cloud migration and hybrid working are extremely attractive right now for customer service organizations, but the volume of customer information and payment data they process are uniquely vulnerable to breaches because it lacks on-site safety measures.

Cyber Breach One of Biggest Business Risks in 2021

August 23, 2021

International concern about data breaches persists as companies work to avoid interruptions in their business as the COVID pandemic continues.

State Department Hit by Cyber Attack, Source Says

August 21, 2021

The U.S. State Department was hit by a cyber-attack in late August; what was affected and who was responsible were unknown, but the mass evacuation from Kabul that was going on at the time was not affected. This came not long after a Senate Homeland Security Committee report gave the department a poor rating for their overall information security.

As Cyberattacks Escalate, It’s Time to Change the Conversation and Focus on Real Change

August 19, 2021

Because some businesses are slow to adapt to cybersecurity threats and don’t recognize the value from their security, technologists must reexamine how they explain to potential customers in order to emphasize the real risks.

Work On Your Wellness: Socializing

August 16, 2021

Socializing and keeping up mental health are important activities for any IT professional. Time away from work can be rejuvenating in a sedentary profession that typically involves staring at a screen for long periods of time.

Cyber Security Standards for Critical Infrastructure

August 4, 2021

To set strong standards for cybersecurity in all levels of critical infrastructure and the private sector, the White House issued a national security memo defining cybersecurity performance goals.

IT Hiring: 5 Ways to Evolve Your Strategy

August 4, 2021

Companies must rethink how they hire and onboard new talent in the wake of COVID-19, and new flexibility and recruiting strategies are required to help stay competitive.

Constant Review of Third-Party Security Critical as Ransomware Threat Climbs

August 3, 2021

Supply chains are vulnerable for companies giving access to third-party vendors; beyond just an initial check before partnering in the first place, companies must also engage in ongoing reviews to ensure cybersecurity is up to standards.

Preventing Ransomware Attacks: Top 9 Things to Keep in Mind

August 3, 2021

Ransomware is becoming an enormous, inescapable problem. A multipronged security strategy can help protect avenues of attack and recover data quickly if necessary.

Congress Hears Ideas for Boosting Cybersecurity Workforce

August 2, 2021

A House subcommittee heard in late July that both the federal government and private sector must think about new ideas for attracting new cybersecurity workers due to the ongoing talent shortage.

Red Teaming—Getting Prepared for the Inevitable

July 8, 2021

Cyber attacks are practically a guarantee as threats continue to evolve. Red teaming can be helpful by thoroughly examining organizations’ response and detection abilities.

For Government Tech Workers, Certification Pays Off in Higher Salaries

July 8, 2021

While experience can be a powerful tool for getting a cybersecurity jobs, more government contracts are requiring specific certifications to receive clearance.

Healthcare Data Breach: Cyber-Attack at Mississippi’s Coastal Family Health Center Leaked Patient Information

July 12, 2021

Patients’ personal data was leaked in a hack on Mississippi’s Coastal Family Health Center in May. The number of people affected was unknown, but the CFHC said it had no evidence any of the data had yet been misused.

Morgan Stanley Reports Data Breach After Vendor Accellion Hack

July 8, 2021

The investment firm recently reported that cyber attackers stole stock plan customers’ personal data by hacking a third-party vendor, exploiting a vulnerability in their Accellion FTP server. Though the files were encrypted, the hackers were able to seize the decryption key as well.

SOC Burnout Is Real: 3 Preventative Steps Every CISO Must Take

June 23, 2021

Being constantly on-call and dealing with increasing workloads increase the possibility of burnout for talented cybersecurity professionals. Chief officers can take proactive steps to aid their team and more efficiently protect their clients.

Addressing the Cybersecurity Skills Gap Through Neurodiversity

June 22, 2021

People with different thought processes can be a real asset in cybersecurity work, when given a supportive environment. We should focus on the benefits of diverse thinking and viewpoints in approaching cybersecurity, including neurodiversity.

What Can Businesses Do to Fill the Cybersecurity Talent Shortage?

June 11, 2021

Increased cyberattacks and rapid digitalization because of the rise of remote work have led to difficulties finding good cybersecurity talent. More companies are working to train their existing employees, as well as shifting their job descriptions.

Sizing Up the New U.S. Executive Order on Cybersecurity

May 21, 2021

After recent cybersecurity breaches, the Biden Administration has released an executive order to enforce new security requirements for companies looking to do business with the federal government. The Administration also hopes to encourage private businesses to follow its lead.

The Gig Economy Creates Novel Data-Security Risks

May 20, 2021

Relying on short-term workers has the potential to open new security vulnerabilities, as data could end up anywhere on the internet through malice or negligence. Extra care needs to be taken with gig workers for the good of the company.

Why We’re Losing the Cybersecurity War

May 19, 2021

To protect businesses from cybercriminals, it would be prudent to not just offer blanket policies, but analyze each person and position in a company to find the human elements that create cyber vulnerabilities.

Ransomware Is a National Security Threat and a Big Business—And It’s Wreaking Havoc

May 15, 2021

Ransomware threatens not only companies’ finances, but also potentially the economy and national security. As the rise of cryptocurrency has fueled ransom attacks in recent years, the danger is growing larger and the implications more dire.

Understand the Cyber Skills Shortage to Get Ahead

May 14, 2021

Recognizing market trends as cybersecurity needs increase can help would-be workers enhance their resumes and develop in-demand skills to make themselves attractive in the marketplace.

Major World Powers Need to Treat Cyberattackers Like Pirates on the Open Seas

May 14, 2021

Ransomware piracy won’t go away on its own; it requires decisive government action. Stopping piracy at sea required denying them places they could find safe harbor, so today’s action would require acting in permissive states.

6 Cybersecurity Job Roles That Are Demanded the Most

May 14, 2021

As cybersecurity is in high demand and encompasses a number of responsibilities, you can chart a course to a number of roles in the field.

Ransomware Gangs Have Leaked the Stolen Data of 2,100 Companies So Far

CompTIA’s Certification Pedigree Is Potent, But Some of Its Credentials Are Not

May 10, 2021

CompTIA has long dominated the IT certification field with 13 certification programs; however, they must continue to adapt and meet the current times if they are to maintain their staying power.

May 8, 2021

As ransomware has evolved from its simpler roots in 2013 to the use of leaking unencrypted data today, 34 gangs have now leaked the data for more than 2,100 organizations.

DHS Kicks Off Workforce Sprint with Push to Hire 200 Cyber Pros

May 6, 2021

The Department of Homeland Security has announced a concentrated hiring initiative to, focusing on a variety of topics, with the hopes of hiring 200 cyber personnel by July 1.

The Cybersecurity Conversation Is Changing

April 29, 2021

Protecting data isn’t just a matter of thinking defensively and countering tactics as cyberattacks happen. Cybersecurity personnel must also become detectives, finding the trail hackers used to get in and sharing information to prevent other companies from facing the same fate.

Why Executive-Focused Security Awareness Training Is Important

March 18, 2021

Many data breaches are financially motivated, and senior executives make attractive targets—they have incredible access and authority, and they are not always tech savvy. Executives must learn to resist social engineering to protect their companies.

Opportunity to Reskill Federal Workforce for AI Jobs ‘Underutilized,’ Panel Warns Congress

March 12, 2021

The National Security Commission on Artificial Intelligence has released a report warning that the Defense Department and intelligence community needs to recruit more talent to stay on top of technology developments.

IT Supply Chain Threats: Who is Responsible for Securing Our Technology?

March 9, 2021

Attention to cybersecurity has increased in the wake of December’s SolarWinds Orion cyberattack. When one link in the supply chain is vulnerable, who is responsible for protecting against breaches?

Cybersecurity in 2021: Stopping the Madness

March 8, 2021

Software hacks have dominated news headlines and it seems like everything is at risk. However, cybersecurity professionals are learning as well, and solutions are possible.

Three Reasons The Security Industry Is Protecting The Wrong Thing

March 2, 2021

The security industry focuses on network security to the neglect of addressing data breaches, which is often a flawed approach to protection. Companies must consider different solutions and avoid the tried-and-true in order to preserve their data.

Why Do Chief Security Officers Leave Jobs So Often?

February 28, 2021

Chief information security officers seem to not stay in their jobs very long—the average tenure is just over two years. The dangerous nature of their work can make them easy scapegoats, but other reasons can account for the short durations.

Tech Together: How AI, Blockchain, Drones, and IoT Can Safeguard the Supply Chain

February 25, 2021

A 2019 E. coli outbreak provided an outline for how to recognize red flags in a supply chain and demonstrate how emerging technologies can work to safeguard food and prevent a problem from becoming a disaster.

Why Was SolarWinds So Vulnerable to a Hack?

February 23, 2021

The 2020 hack of SolarWinds granted access to the computer networks of many of their customers (including U.S. government agencies) for months, creating major problems for U.S. national security. Part of the blame rests with SolarWinds’ parent company cost-cutting, leading to underspending and outsourcing on vital security functions.

Compliance, Privacy, Security in a Work From Home (WFH) Environment, Oh My!

February 22, 2021

Working from home is becoming more widespread, and presents new challenges with regulation, privacy, and security. Figuring out the risks of each home environment and each remote-work device is important to assess how best to enable effective security measures.

Most Executives Expect to Spend More on Cybersecurity Risk Management

February 17, 2021

A recent poll of IT executives found that the majority of them are satisfied with how their organization is dealing with cybersecurity risk, though they anticipate budget increases soon. Further, execs in larger companies report being more content with their risk management.

Supply Chain Threats and the Cybersecurity Solution

February 1, 2021

An entire supply chain can be disrupted by a malware or ransomware attack at a weak link. Simple solutions like an incident management plan or having backups can mitigate the damage, though they are often overlooked.

9 Top Jobs in IT That Are Currently Booming With Opportunities

February 1, 2021

IT professionals are seeing a booming market, with jobs expected to increase through 2028. Positions like DevOps engineers, software engineers, and information systems security managers are among the jobs that require advanced understanding and vast experience, but expect growth in years to come.

Top Cyber Attacks of 2020

January 27, 2021

The COVID-19 pandemic and related economic uncertainty brought with it new kinds of cyberattacks in 2020, taking advantage of people’s fears or use of online meeting apps. Even the coronavirus response and the U.S. federal government were subject to attacks.

9 Lessons We Learned From Cybersecurity Experts in 2020

January 12, 2021

Hackers are sharing information among themselves that can exploit vulnerabilities small- and medium-sized businesses vulnerable, and it’s up to cybersecurity personnel to similarly coordinate and recognize what they can do to protect their charges.

Six Hot Data Privacy Certifications for 2021

January 4, 2021

Privacy and data protection credentials can be highly useful and demonstrate knowledge to companies searching for trained professionals to help them safeguard valuable customer information.

Right Strategy, Wrong Century

January 1, 2021

Commonplace use of computers has blended national and economic security, and attacks that decades ago would have been tanks and missiles has been replaced by cyberwarfare. National defense is no longer simply the U.S. military, but must also prioritize cyberdefense as we find ourselves in a different kind of arms race.

More Cybersecurity Articles