Thursday, April 27, 2017

Our Presentation was successful!!!!!













Friday, April 21, 2017

32% of respondents say their organization has an acute shortage of application security skills. That isn't a surprise because application security is one of the most important areas of info sec that is too often overlooked. CISOs faced with a skills shortage here should look toward service providers and automated tools from O WASP or vendors such as IBM, Vera code or White Hat Security. The ESG/ISSA data reinforces my position that the cyber security skills shortage represents an existential threat. Enterprise organizations, many of those that handle our data and transactions daily, are understaffed and under-skilled.


Cyber security skills shortage is the biggest cyber security issue we face today. Not only are there too few bodies to fill the cyber security jobs, but a recent series of research reports from ESG and the Information Systems Security Association (ISSA) indicates that many currently employed cyber security professionals are overworked, not managing their careers proactively, and not receiving the proper amount of training to stay ahead of increasingly dangerous threats.

Monday, April 17, 2017



MITRE aspires to create a stronger nation and a better world by contributing to breakthroughs in cyberspace safety and security. Through our integrated efforts, we advance transformational cybersecurity across MITRE’s sponsors that:
  • Deliver ground-breaking innovations that radically change the way the community approaches cybersecurity and privacy
  • Chart the way to a more secure and resilient government
  • Accelerate solutions that enable the safe and secure use of cyber-physical-human systems
  • Chart a path to coordinated cyber operations across government
MITRE advocates a balanced security posture that combines classic cyber defense with a new emphasis on gathering and sharing intelligence information about threat actors. With this innovative model, defenders become both intelligence collectors and producers.
Protecting the data in electronic health records did not start with the advent of HIPAA (Health Insurance Portability and Accountability Act of 1996) as many people think. Protecting health records has been a critical requirement in the healthcare space since the computers became a fixture in hospitals. Stealing EHRs is better for cyber criminals than stealing credit cards, which can be used only until the card expires, is maxed out or canceled, according to a Trend Micro study released last month. Statistic shows that it helps explain why cyber criminals are attracted to EHR data is that 91 percent of the U.S. population has health insurance. It's no wonder, then, that 113.2 million healthcare-related records were stolen in 2015
Screaming sirens serenaded Dallas residents in the early morning hours Saturday after a cyberattack set off the city's emergency warning system. All of the city's 156 sirens reportedly were set off more than a dozen times. Officials have not yet identified the perpetrator of the attack, but it likely was someone outside the Dallas area, said Office of Emergency Management Director Rocky Vaz.

Wednesday, March 8, 2017

Just a little update Tiara Threadford and i will be conducting a presentation to the freshman and sophomore class on Cyber Security Awareness.  We will pass out surveys on how well did we produce the information and to just answer any questions that anyone has pertaining to Cyber Security.