Cybersecurity and Private Data
Data in its various forms have distinct value. The value is to the owner of the data in that if it were to leave the company in an...
Cybersecurity, Technology and Politics
In the upcoming midterm elections, technology will play an important and increasing role in helping to determine who will be victorious...
Cybersecurity and Women
The facts speak for themselves...there are literally hundreds of thousands of unfilled cybersecurity positions, there is expected to be a...
Cybersecurity and Email
By Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development. What you put in your emails is not,...
Cybersecurity and Cell Phone Towers
The typical cell phone towers are omnipresent through the countryside and in the cities. In the cities they may be located on parking...
Cybersecurity and Internal/External Threats
Threats to the enterprise abound from many different avenues. There basically is no limit as to where the threat may be directed from. A...
Cybersecurity and Insider Threats
The insider threat risk has never been larger and carried more concern than now. A few years ago a stock trading algorithm was liberated...
Cybersecurity and Threat Management
Threat Management: Internal & External Threats to the enterprise abound from many different avenues. There basically is no limit as to...
Artificial Intelligence-Telemedicine
ARTIFICIAL INTELLIGENCE-TELEMEDICINE: Mythology of Telemedicine Operations Joseph O. Esin Professor of Computer Science/Cybersecurity...
Cybersecurity and Culture
Changing Cultures by Dr. Jane A. LeClair Cybersecurity is a word that is getting a lot of attention these days. Hardly a week passes...