Program developed to train cybersecurity professionals
The University of Arkansas received a five-year, $4.63 million award from the National Science Foundation to recruit, educate and train the next generation of cybersecurity professionals.
Anomaly detection can prevent cyber attacks
Understanding what devices a manufacturer has working on a network is important, but the next step is to take that knowledge and move toward prevention.
Researchers working on automating fleet of drones
A team of researchers at Iowa State University are looking to deploy fleets of drones, but it’s trickier than it sounds due to unexpected weather events and cybersecurity concerns.
Researchers developing tools to encourage users to change passwords
Researchers from the University of Bath and Goldsmiths investigate whether a device that plugs in to a PC and signals to a user to change their password could help improve cybersecurity.
Method developed to detect cyber attacks with compressed network traffic
Researchers at the U.S. Army Research Laboratory (ARL) and Towson University are developing a method on compressing network traffic as much as possible without losing the ability to detect and investigate malicious activity.
Safety and cybersecurity need to be the backbone for manufacturing
Safety and security have become more interconnected as systems once immune to cyber attacks are now becoming vulnerable in an increasingly interactive world.
Protecting the production line in the Industrie 4.0, IIoT age
Manufacturers are using the Industrial Internet of Things (IIoT) and Industrie 4.0 to make factories smarter, but they can’t lose sight of basic cybersecurity best practices.
Research team looking to secure blockchain from cyber attacks
A research team from Northern Arizona University is looking to secure blockchain with an architecture that is compatible with cloud-based solutions.
Cybersecurity needs understanding and communication to work effectively
Communication and understanding between the information technology (IT) and operations technology (OT) department needs to improve as cyber attacks become more prevalent.
Supply chain security advice and guidelines
Supply chain security is crucial as data becomes more important to a company’s success. Ten principles from the Charter of Trust and 17 baseline requirements for the supply chain are highlighted.