Cybersecurity

  • Clippings of computer crime headlines with computer mouse cord wrapped around a globe

    When Ransomware Becomes the Smoke Screen for Real Disruption: Picks of the Week

    “Ransomware Remixed: The Song Remains the Same” | Lawfare “Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons” | The New York Times “Global Cyber Attack Likely Cover for Malware Installation in Ukraine” | Reuters In the past month, malicious actors have twice used cyberweapons stolen from the National Security Agency (NSA) against countries around the world in a series of escalating cyber attacks that have targeted hospitals, banks, transportation systems, and even nuclear … Read More

  • Local executives engaged in cyber tabletop exercise

    Pell Center Hosts Cybersecurity and Healthcare Exercise Ahead of Real-Life Global Cyber Attack

    Senior leaders and security professionals from over 30 healthcare organizations in New England, as well as representatives of the R.I. Department of Health, R.I. Office of the Health Insurance Commissioner, R.I. Commerce Corporation, Newport County Chamber of Commerce, and law enforcement agencies convened at the Pell Center at Salve Regina University on May 10, 2017 to participate in a cybersecurity tabletop exercise focused on specific challenges and potential responses to … Read More

  • Map with yellow pin stuck in Doha, Qatar

    Easy Hack May Spark Next Middle Eastern Conflict: Picks of the Week

    The Hack that Caused a Crisis in the Middle East Was Easy | Motherboard News Agency Hack Blamed for Diplomatic Meltdown in Qatar | CSO Online US Suspects Russian Hackers Planted Fake News Behind Qatar Crisis | CNN Will Qatar’s Diplomatic Exile Spark the Next Great War? | Foreign Policy A cybersecurity incident at the Qatar News Agency (QNA) may have been the cause behind the sudden diplomatic break between Qatar and multiple Gulf Cooperation Council (GCC) states, … Read More

  • The words "cyber attack" in newspaper print

    ‘WannaCry’ Ransomware Attack was a Wake-up Call: Picks of the Week

      New WannaCry Cyber Attack Could Target Tens of Thousands of Home Computers | Newsweek Hacking Attack Has Security Experts Scrambling to Contain Fallout | The New York Times Services Interrupted as Hospitals Push Fixes to WannaCry Ransomware Exploit | Forbes Governments, companies, and security experts from around the world raced to contain the fallout from last week’s audacious global cyberattack amid fears that if they did not succeed, data … Read More

  • Man uses phone applications for email, shopping and other daily activities

    Cybersecurity Can No Longer Be Ignored: Picks of the Week

    Why Everything Is Hackable | The Economist Hey: Don’t Click That Weird Google Docs Link You Just Got (and Tell Your Mom Not to Click, Either) | New York Magazine Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice | Centre for International Governance Innovation There’s a good chance you — or someone you know — received an email on Wednesday inviting you to edit a document in Google … Read More

  • Transatlantic Digital Debates

    Senior Fellow Francesca Spidalieri Named to New Cohort of Transatlantic Digital Debates Fellows

    Francesca Spidalieri, Senior Fellow for Cyber Leadership at the Pell Center at Salve Regina University, has been selected as a fellow for the 2017 Transatlantic Digital Debates (TDD) program. The TDD program is a joint initiative of the Global Public Policy Institute (GPPi) in Germany and New America, a Washington, DC, based think-tank. Together, the two organizations bring a select group of young professionals together from their respective countries to … Read More

  • Man uses smartphone as home automation device

    Is your phone or smart home device spying on you? Picks of the Week

    Are your sensors spying on you? | Science Daily Amazon Makes the High-Performance 7-Mic Voice Processing Technology from Amazon Echo Available to Third-Party Device Makers | Amazon Hackable IoT washing machine provides channel for breaching hospital IT | CyberScoop Technology is infused in our modern life. Attempts at attaining perspective often fall to historical comparisons. Images frequently circulate of warehouse-sized computers from the 1960s which can hardly compare to the … Read More

  • Streams of binary code being transmitted from the phones and tablets of people walking to work over London Bridge

    More Women Needed to Close the Cybersecurity Workforce Gap: Picks of the Week

    The 2017 Global Information Security Workforce Study: Women in Cybersecurity | Center for Cyber Safety and Education, (ISC)2, and the Executive Women’s Forum No Woman’s Land: Cybersecurity Industry Suffers from Gender Imbalance, Discrimination | Law.com Women May be the Key to Unlocking Cybersecurity Workforce Deficit Puzzle | Bloomberg Information security demand is far outpacing the supply of knowledgeable and experienced cybersecurity professionals capable of addressing the numerous cyber threats that … Read More

  • An American flag at center of a cyber grid

    Trump, Twitter, and the Tide of Cybersecurity: Picks of the Week

    Obama officials: There is hope for cybersecurity under Trump | The Christian Science Monitor At RSA, doubts abound over US action on cybersecurity | CSO Online The Rules of the Brave New Cyberworld | Foreign Policy This year’s RSA Conference—one of the largest cybersecurity conferences in the world—broke attendance records with over 40,000 participants, including cyber professionals, academics, and public servants. Although the conference has historically been focused primarily on security tools and … Read More

  • Clip art image of people interacting with technology on data privacy day

    Data Privacy Day: How to Protect Yourself and Your Organization Online: Picks of the Week

      Americans and Cybersecurity | Pew Research Center Data Privacy Day: Easy Tips to Protect Your Privacy | Forbes Data Privacy Day: know the risks of Amazon Alexa and Google Home | Naked Security Today is Data Privacy Day (DPD), an international effort held annually to raise awareness about data privacy and promote data protection best practices. This event is celebrated every year on January 28th in commemoration of the signing of … Read More

Page 2 of 1112345...10...Last »