article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

As the field of cybersecurity continues to evolve and expand, pursuing a Master’s degree in this discipline offers an opportunity to delve into cutting-edge research and contribute to the advancement of knowledge in this critical area. Blockchain and Cybersecurity: Investigate the use of blockchain technology in enhancing cybersecurity.

article thumbnail

Is Killware the next big Cyber Threat

CyberSecurity Insiders

Precisely speaking, it a new cyber threat that targets infrastructure that is essential for a living like power sector, aviation, banks, fuel supply, transport services, emergency responses like 911 servers, water utilities and food supply chain. Also removing legacy systems that lack basic security measures makes complete sense.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Threat in 3D Printing says Pentagon

CyberSecurity Insiders

Pentagon, the headquarters for United States Department of Defense has issued a special cyber threat alert to the military sector using Additive Manufacturing(AM) through 3D printing technology. The post Cyber Threat in 3D Printing says Pentagon appeared first on Cybersecurity Insiders.

article thumbnail

Hyperautomation and Cybersecurity – A Platform Approach to Telemetry Architectures

McAfee

In the context of cybersecurity, a patchwork of stovepipe solutions not only exposes the environment to risk, but also impacts the cyber defender’s ability to fortify the environment and respond to threats at machine speed. From my perspective, we should expand the definition and scope of cybersecurity.

article thumbnail

‘Tis The Season for Holiday Cyber Threats Targeting Enterprises in a Pandemic World

McAfee

Supply chain and logistics, e-commerce and retail, and the travel industry traditionally experience holiday seasonal increases in consumer and business activity, making them more vulnerable to cyber threats and leaving business, employee, and consumer data at risk. of the total detected cyber threats.

article thumbnail

SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity

The Last Watchdog

This explains the rise and popularity of Zero Trust as a framework for securing networks in these new realities as an effective tool to drive cybersecurity initiatives within the entire enterprise. This puts tremendous pressure on IT professionals to rethink their architectures and IT strategies to meet the challenge.

article thumbnail

Policy Brief – U.S. Cyber Threat Intelligence, Part 2: Summary, Recommendations & Challenges

CyberSecurity Insiders

He is an Information Technology professional with over 18 years of experience focused on cybersecurity issues. Executive Summary: This policy brief was created to summarize the Biden Administration’s Executive Order on Improving Cyber Security through the lens of Cyber Threat Intelligence.