Author Archive

Hacker group “Anonymous” declares digital war on ISIS

On Nov. 13, terrorists who were later linked back to the extremist group ISIS, attacked several locations in Paris, France. The attack killed 129 people and wounded another 352. The French government declared war on the group in response to the bloodshed, but...  [Read More]

Hello Alumni!

Our first Alumni Blog! Greetings and welcome to Excelsior College’s National Cybersecurity Institute Alumni blog. As a graduate of the school’s Master of Science – Cybersecurity program, I am privileged and delighted to have the opportunity to author this forum. The intent...  [Read More]

Law Enforcement Cybercrime Series: Tools, Tactics & Techniques

Social engineering is the art of gaining access to buildings, systems or data by exploiting human psychology. Social engineering is all about information. The cyber-criminal wants to gather as much information about the target as is possible. Some of the techniques that...  [Read More]

An in-depth look at ‘Hactivism’

As National Cybersecurity Awareness Month draws to a close, the National Cybersecurity Institute conducted one final case study. The study was entitled "Hactivist Cyber Breach Operations for Social Change." In this case study, NCI examined hactivism and the social implications of this...  [Read More]

The United Nations and Cybersecurity

The United Nations and Cybersecurity The United Nations Group of Government Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (GGE) met in New York to debate the extent to which current international law applies...  [Read More]

A guide to data protection while traveling abroad

Many people will venture outside of the U.S. However, while they are booking plane tickets, making hotel reservations and packing, they may overlook an important aspect of international travel: cybersecurity....  [Read More]

Who are the hidden faces of Cyber Talent?

As Veterans Day comes to a close, and everyone has enjoyed the day with their veteran of choice; a sister or brother, uncle, father, and son. I ponder on my family of veterans; the service they contributed, and wonder where there career...  [Read More]

Good Uses of a Cloud for Small Businesses

More businesses than you might think have migrated to clouds for storage of company information. Frequently, select functions are moved as a business explores the value and cost trade-offs of cloud storage vs in house servers. A 2015 cloud survey from Harvard...  [Read More]

Offshore Outsourcing in Healthcare

Offshore firms are business associates and as such are subject to the HIPAA security rules. As stated in the last posting HIPAA requires covered entities to conduct a risk analysis. The risk analysis is the foundation for meeting HIPAA compliance. Organization must...  [Read More]

Interview with Sherri Ramsay

In October 2015 and as part of the NCI’s IWICS, Dr. Jane LeClair hosted Sherri Ramsay. Sherri is currently the Senior Advisor to the CEO of CyberPoint International, where she is engaged in strategy development and planning, partnership development, and marketing. She...  [Read More]