Cyber Leadership

  • Unlocked cybersecurity graphic

    The Equifax Breach is a Case Study in Why We Need a National Data Notification and Protection Law: Picks of the Week

    “The Time is Now for Congress to Act of a National Data Breach Notification Law” | The Hill “Equifax Breach Prompts Scrutiny, but New Rules May Not Follow” | The New York Times “The single most depressing thing about the Equifax breach” | The Washington Post It took over six weeks for credit bureau Equifax – one of the three major credit reporting firms in the U.S. – to disclose the massive data breach that potentially … Read More

  • Jason Healey on “Story in the Public Square’” September 9, 2017

    Information technology has changed nearly everything about modern living: the way we communicate, earn a living, and even how we date.  Guest Jason Healey examines the implications of cybersecurity on war and statecraft. Jason Healey is a Senior Research Scholar at Columbia University’s School for International and Public Affairs specializing in cyber conflict, competition and cooperation. Prior to this, he was the founding director of the Cyber Statecraft Initiative of … Read More

  • Ipad with HBO's Game of Thrones on the screen.

    Game of ‘pwns’: Cybersecurity Lessons from the latest HBO Hack – Picks of the Week

    Hackers Demand Millions in Ransom for stolen HBO Data | Associated Press Spoiler Alert: Hackers Are Gunning for Hollywood | Variety  The HBO Hack Was Reportedly up to Seven Times Larger Than the Sony Hack | Vanity Fair It seems that no one can escape cyber threats or data breaches these days – everything from political parties to the King in the North – appear vulnerable to attack. The latest victim in a string of embarrassing … Read More

  • Map of the United States with large lock in the center to represent cyber security

    As U.S. States Join Forces to Boost Cybersecurity, Federal Government Slashes U.S. Leadership in Cyberspace

    “38 Governors Sign ‘a Compact to Improve State Cybersecurity’” | Government Technology “Tillerson to Shut Cyber Office in State Department Reorganization” | Bloomberg “Top State Cyber Official to Exit, Leaving a Myriad Questions” | Politico Rhode Island recently hosted the National Governors Association (NGA) meeting, during which 38 state governors pledged to make cybersecurity a top priority and agreed to further develop statewide plans to enhance cybersecurity governance, prepare and defend their states from cyber incidents, … Read More

  • Clippings of computer crime headlines with computer mouse cord wrapped around a globe

    When Ransomware Becomes the Smoke Screen for Real Disruption: Picks of the Week

    “Ransomware Remixed: The Song Remains the Same” | Lawfare “Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons” | The New York Times “Global Cyber Attack Likely Cover for Malware Installation in Ukraine” | Reuters In the past month, malicious actors have twice used cyberweapons stolen from the National Security Agency (NSA) against countries around the world in a series of escalating cyber attacks that have targeted hospitals, banks, transportation systems, and even nuclear … Read More

  • Local executives engaged in cyber tabletop exercise

    Pell Center Hosts Cybersecurity and Healthcare Exercise Ahead of Real-Life Global Cyber Attack

    Senior leaders and security professionals from over 30 healthcare organizations in New England, as well as representatives of the R.I. Department of Health, R.I. Office of the Health Insurance Commissioner, R.I. Commerce Corporation, Newport County Chamber of Commerce, and law enforcement agencies convened at the Pell Center at Salve Regina University on May 10, 2017 to participate in a cybersecurity tabletop exercise focused on specific challenges and potential responses to … Read More

  • The words "cyber attack" in newspaper print

    ‘WannaCry’ Ransomware Attack was a Wake-up Call: Picks of the Week

      New WannaCry Cyber Attack Could Target Tens of Thousands of Home Computers | Newsweek Hacking Attack Has Security Experts Scrambling to Contain Fallout | The New York Times Services Interrupted as Hospitals Push Fixes to WannaCry Ransomware Exploit | Forbes Governments, companies, and security experts from around the world raced to contain the fallout from last week’s audacious global cyberattack amid fears that if they did not succeed, data … Read More

  • Man uses phone applications for email, shopping and other daily activities

    Cybersecurity Can No Longer Be Ignored: Picks of the Week

    Why Everything Is Hackable | The Economist Hey: Don’t Click That Weird Google Docs Link You Just Got (and Tell Your Mom Not to Click, Either) | New York Magazine Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice | Centre for International Governance Innovation There’s a good chance you — or someone you know — received an email on Wednesday inviting you to edit a document in Google … Read More

  • Transatlantic Digital Debates

    Senior Fellow Francesca Spidalieri Named to New Cohort of Transatlantic Digital Debates Fellows

    Francesca Spidalieri, Senior Fellow for Cyber Leadership at the Pell Center at Salve Regina University, has been selected as a fellow for the 2017 Transatlantic Digital Debates (TDD) program. The TDD program is a joint initiative of the Global Public Policy Institute (GPPi) in Germany and New America, a Washington, DC, based think-tank. Together, the two organizations bring a select group of young professionals together from their respective countries to … Read More

  • Streams of binary code being transmitted from the phones and tablets of people walking to work over London Bridge

    More Women Needed to Close the Cybersecurity Workforce Gap: Picks of the Week

    The 2017 Global Information Security Workforce Study: Women in Cybersecurity | Center for Cyber Safety and Education, (ISC)2, and the Executive Women’s Forum No Woman’s Land: Cybersecurity Industry Suffers from Gender Imbalance, Discrimination | Women May be the Key to Unlocking Cybersecurity Workforce Deficit Puzzle | Bloomberg Information security demand is far outpacing the supply of knowledgeable and experienced cybersecurity professionals capable of addressing the numerous cyber threats that … Read More

Page 2 of 1112345...10...Last »