WiCyS Security Corner
Dive into cybersecurity news outside of the WiCyS organization. Have a resource we should add? Reach out to us at [email protected].
The “AI” Series | Data Exploration and Visualization
Written by: Prajakta Jagdale | Director, Offensive Security | Palo Alto Networks This will be the first of many posts covering topics across data analysis, data science, data visualization, and machine learning as they pertain to cybersecurity. While it likely will...
Digital Misdeeds of the Unwitting
All cybersecurity strategies are based on considerations of the acts of sophisticated and highly motivated threat actors like ransomware groups or nation/state-sponsored actors, as they should be. InfoSec teams today rely on highly skilled Red Team professionals to...
’Tis the Season to be Cautious, Fa la la la la, la la la la
Before we get onto the note of caution, for those currently observing Seasonal Holidays around the world, we’d like to wish you all a joyful and safe time with your loved ones. For many of us, it’s the time to exchange gifts, many of them being tech gifts that are...
Great Open Source comes Great Responsibility
The Solarwinds attack of 2020 thrust software supply chain attack techniques once again into the limelight. Threat actors quickly pivoted to leveraging Open Source Software to perpetuate numerous software supply chain compromises. While not a novel means of...
Maryville University: 4 Healthcare Cybersecurity Challenges
Maryville University Tables of Contents Issues faced in healthcare cybersecurity #1: Patient privacy protection #2: Vulnerabilities of legacy systems in healthcare #3: Challenges of IT in healthcare #4: Security breaches in healthcare Modernizing healthcare to reduce...
Multi-Factor Authentication: Battle of the Factors
Multi-factor authentication (MFA) is an essential mechanism to defend against unauthorized access authentication attempts. Over the years, a number of algorithms and protocols have been developed to promote secure authentication factors. However, not all factors are...
Privacy – Preserving Technology for Secure Communication
Data has become the newest and most valuable currency of the digital age. Increasing amounts of data are being processed and exchanged to aid customizations, targeted advertisement, user profiling and tracking, and myriad other purposes. While regulatory entities are...