Chief of Cybersecurity
Latest Episodes
Improving Businesses Cybersecurity Engagements
Business engagements for cybersecurity have focused on being the medium between suppliers, customers, and hackers. Many organizations suffer significant security risks due to changing risk profiles and attack surfaces. The management strategies may invoke
Cybersecurity in the School System
The shift to remote education and online learning has prompted many schools to increase their digital protection. Before COV19, online education entities and K-12 learned through classroom instructions. Since the change, many K-12 students are learning fr
The Automobile Industry is Facing Cybersecurity Risks.
We drive our cars daily and enjoy the luxury of the many features, but security risks are embedded. The cybersecurity landscape has no boundaries, and just as if healthcare, financial, and educational entities face risk – so does the automotive industry.
Supply Chain Management and Cybersecurity
Supply chain management (SCM) is the active management of supply chain activities to maximize customer value and achieve sustainable competitive advantage. It represents a conscious effort by the supply chain firms to develop and run supply chains in the
TikTok Says It\'s Putting New Limits on Chinese Workers\' Access to U.S. User Data
TikTok is working on a deal with the Biden administration that would \"fully safeguard\" the app in the U.S. and quell fears about the Chinese government\'s accessing Americans\' data, according to a letter TikTok sent to nine Republican senators. This is
COVID-19 has transformed how companies operate today.
With 50 percent to 90 percent of staff working remotely, organizations are now looking atremote work as the new working stylein the future.While working remotely has its benefits, one of the biggest challenges it presents is cyber security problems.Re
Technology is integral to a child’s life
They will see it everywhere from birth and will inevitably grow up using it. It can be extremely educational, help build skills, and be a creative outlet. It can also be dangerous predators, hackers, and other threats use technology to hurt others. Wel
Cybersecurity programs gain popularity with veterans
As the U.S. military continues to expand its IT ranks, many employers have stepped up efforts to recruit military talent into their IT teams to better secure networks. As a result, online cybersecurity courses such as those at Western Governors University
Developing An End-to-End Vulnerability Management Process
One of the critical programs that shape cybersecurity risks is having a process that helps remediates vulnerabilities. Most users and organizations utilizevarious tools, analytical platforms, reporting, and various teams to help reduce risks associated w
Cyber Agency: Voting Software Vulnerable in Some States
Electronic voting machines from a leading vendor used in at least 16 states have software vulnerabilities that leave them susceptible to hacking if unaddressed. These vulnerabilities, for the most part, are not ones that could be easily exploited by someo