Cybersecurity Center Article Archive

The Cybersecurity Center at Purdue Global has compiled a list of cyber defense articles. Read on to learn more about current trends and challenges in the cybersecurity industry.

Deep Learning & Cybersecurity

April 25, 2019

As current network security measures fail to keep up with new cybersecurity threats, IT is turning to deep learning and other types of artificial intelligence (AI). As dep learning becomes more accessible to organizations, it supports innovation and the execution of complex business processes.

Ethical Hacker Guilty of Malware Attacks

April 23, 2019

Cybersecurity researcher Marcus Hutchins was instrumental in stopping ransomware from encrypting the databases of government agencies and networks in over 150 countries. But while still a minor, Hutchins developed and distributed malware that played a role in attacks on U.S. banking systems.

IoT, GDPR and More Cybersecurity Trends in 2019

April 12, 2019

TÜV Rheinland released its Cybersecurity Trends 2019, a report that contains eight important developments in cybersecurity. 

Critical Infrastructure Is Under Worldwide Attack

April 10, 2019

Cyberattacks on critical infrastructure have increased significantly recently, and these attacks negatively impact crucial networks around the globe. Learn about seven key findings and recommendations for improving network security.

Newly Discovered RobinHood Ransomware Variant Drops Four Ransom Notes at Once After Encryption

April 15, 2019

The RobinHood ransomware targets computers within an entire network, encrypting files until the victim pays the ransom amount. Once the ransom is paid, the attackers delete the encryption keys and IP addresses to protect the victim’s privacy.

New Phishing Scam “The Nasty List” Targets Instagram Users’ Login Credentials

April 15, 2019

A phishing scam called “The Nasty List” targets Instagram users to gain access to their accounts. Once accounts are compromised, the scammers will send messages to followers of the hacked accounts to further promote the scam.

Big Companies Thought Insurance Covered a Cyberattack. They May Be Wrong.

April 15, 2019

Companies can face hundreds of millions of dollars in damages from a cyberattack blamed on a foreign government, but a common clause in insurance contracts, the “war exclusion,” protects insurers from having to reimburse costs related to damage from cyber war.

Is Assange’s Arrest a Threat to the Free Press?

April 11, 2019

Many people, including those who did not support Julian Assange’s actions, were alarmed by the idea that Assange could be punished for his role in exposing American government secrets. Those concerned with civil liberties believe elements of his indictment could set a dangerous precedent.

National Teams Engage in NATO’s Annual Cyber Challenge

April 15, 2019

NATO’s annual cyber challenge Locked Shields enables participants to enhance their skills and train as national cyber rapid reaction teams in a realistic large-scale cyber incident. More than 1,200 international cyber security experts took part in the 2019 challenge.

America Remains Vulnerable to Cyber Attack

April 16, 2019

To protect U.S. critical infrastructure, former CIA director Leon Panetta and former Republican Senator James Talent recommend separating business IT systems from systems that control infrastructure and allowing private-sector or academic cybersecurity experts to work for federal agencies.

How Cybersecurity Analysts Can Stand Out to Potential Employers

April 8, 2019

Despite the demand for qualified cybersecurity applicants, it’s difficult for hiring managers to fill cybersecurity analyst roles. IT professionals need to know what hiring managers look for in security analysts and how best to highlight their skills when searching for cybersecurity positions.

Linux and Cybersecurity: Your Linux Skills Can Help Protect the World’s Data

April 10, 2019

Learn about some of the new and emerging groundbreaking opportunities for using Linux in IT and cybersecurity.

Your Next Move: Data Scientist

April 15, 2019

Part of an IT Career News series called Your Next Move, this article outlines the role of the data scientist, the steps to become one, and the career outlook for the profession.

AI Driven Cybersecurity Gives Companies a Fighting-Chance

February 28, 2019

Artificial intelligence has the potential to become a strong line of defense against cyber threats, provided it has been constructed with sharp risk assessment and incident response in mind.

CompTIA Advanced Security Practitioner (CASP+): Validating Cybersecurity Skills for Government and Corporate Teams

January 28, 2019

The CompTIA Advanced Security Practitioner (CASP+) certification used by cybersecurity personnel for the U.S. Navy can also provide advanced utility in the corporate sector. CASP+ can benefit both job seekers looking to demonstrate their cybersecurity skills and corporations searching for the right hire.

Cyber Security Pros Are Feeling the Pressure

March 6, 2019

A survey shows the impact that stress has on cybersecurity personnel, with many saying they work more than 40 hours a week or feel unable to disconnect from their work.

Four Ways That Fake-News Sites Trick People

March 5, 2019

Fake-news websites have been appearing with increasing frequency and produce a constant stream of falsehoods that quickly spread across social media. They use several methods to trick readers into believing and spreading stories that can seem real.

Is Cybersecurity More Important Than Cost, Schedule or Performance?

February 1, 2019

As government defense systems face an increased need for cybersecurity, acquisition policy also has room to improve. While price, schedule, and performance are normally the “three pillars of acquisition,” security incidents can necessitate prioritizing the best solutions.

Lack Of Tech Expertise at Board Level Puts Strategy at Risk

February 25, 2019

A recent poll suggests that boards lack the expertise to fully understand the challenges and opportunities that data and technology present to their organizations. Technology is now emerging more quickly than ever, and governance professionals can find themselves quickly falling behind.

Meeting the Cyber Talent Challenge Head-On

February 14, 2019

As data breaches and cyber criminal threats become more common, human resources professionals must help organizations acquire the best talent by identifying the right roles and demonstrating corporate dedication to cybersecurity.

Personal Cyber Insurance Market Could Be Worth $3B by 2025

February 26, 2019

The global market for personal cyber insurance is expected to grow rapidly over the next several years. These policies are specifically designed to cover any loss or liability in the event of a cyber attack.

The State of the SOC: the Digital Divide

January 30, 2019

Global security operations center professionals are part of the first line of defense against cyber threats but can be estranged from chief information security officers by stress and business needs. Bridging the gap between security and IT operations is critical to protect against cyber threats.

The Top 5 Malware Attack Types

February 12, 2019

Malware can infect a computer system in a variety of ways, and as the number of cyber attacks increases, so also does the number of different malware types of which to beware.

The US Pentagon Has Numerous Security Gaps

January 23, 2019

A recent U.S. Defense Department report indicates that the Pentagon must address a large number of cybersecurity vulnerabilities, many of them related to proper governance.

The US Pentagon Is Speeding-Up Its Cloud Strategy

February 22, 2019

The Defense Department has released its military cloud strategy, which plans to emphasize defense against cyber attacks and the safety of its soldiers.

White Hat Female Hacker Lead the Way

February 13, 2019

Sherri Davidoff, CEO of LMG Security, leads an all-female management team of “white hat” hackers who use hacking to test companies for cybersecurity flaws.

Will Blockchain Change the World?

February 22, 2019

Blockchain, an electronic distributed database of recorded transactions, has enormous potential in a variety of industries and has attracted a lot of positive attention, though any revolution is still in its infancy.