As reports of cyberattacks multiply--from national election-related hacking to school-level phishing scams--the need for trained high school and postsecondary graduates in the field is growing. And increasingly, industry, governments, and educators are looking to introduce students to online security earlier in their K-12 careers, in the hope of encouraging their continued academic study of the topic and their awareness of careers in the field.
China ranks second only to the United States in terms of internet development and innovation, but among the worst on cybersecurity and industry infrastructure, according to a survey of 38 countries by a Beijing-backed think tank.
“We were used, in the Cold War, to having the current edge in technology, partially because the Russians adopted a policy after World War II to draft off our technology - so they designed their fighters to use F/A-18 radar because they knew they’d be able to steal them,” Lehman said on Wednesday at a Maritime Security Dialogue event cohosted by the U.S. Naval Institute and the Center for Strategic and International Studies.
The White House on Wednesday lifted the veil on the secretive executive branch process used to determine which computer security flaws it can use in surveillance and which it will report to tech firms to allow them to patch. The Trump administration published a first-ever charter for that system, known as the vulnerability equity process (VEP), on Wednesday morning.
The name “Equifax” now sends shivers down our spines. The company we trusted to handle our credit scores has become a pariah of the financial world since it allowed hackers to steal vital information from 145 million American adults.
Information-technology security professionals gathered Friday at Oregon State University-Cascades to learn new ways to protect their companies from attacks like the one that affected 40 million Target customers, or the one that affected 1 billion Yahoo users. While plenty of tools and procedures are available that will enhance cybersecurity, experts said an organization’s own employees and vendors can pose the greatest threats to its network.
Today, the National Science Foundation (NSF) announced $74.5 million in funding for foundational research and education that aims to address the growing cybersecurity challenge. This investment, through the NSF Secure and Trustworthy Cyberspace (SaTC) program, is critical to achieving a safe, secure, resilient and trustworthy cyberspace, including associated critical infrastructure such as the energy grid and transportation systems.
Small businesses are the backbone of the American economy and employ almost half of the working population. Yet because of their size, they rarely have access to the same information security resources as large firms. Without significant IT departments or dedicated information security personnel, they may be more at risk of cyberattacks than large enterprises.
With the cost of attacks increasing, companies want to hire more cybersecurity professionals to help protect their information and profits. However, companies have only begun these massive hiring pushes in the last few years, so there is not an equivalent pool of candidates entering the field. In fact, most of the current cybersecurity workforce are seasoned veterans of the information technology field and are nearing retirement.
“Scam or phishing emails typically have one of two strategies: fear or greed,” Jonathan Penn, Director of Strategy at security software firm Avast, told Fox News. “Fear includes email notifications that your account has been locked, there are charges that you didn’t make, or just that there’s been suspicious activity you need to check. Greed includes notifications about free gifts, trips, or gift cards; stock advice or debt consolidation or financial advice." Phishing scams are often presented as a call for immediate action. That should always be a tip off.