Author Archive

The Dark Web

The recent Ashley Madison hack brought discussion of the Dark Web back into the mainstream when the hackers posted the stolen data via Tor. Tor software is used to anonymize the web address via a series of encryption layers and redirections that...  [Read More]

Facebook looking to increase the number of women in cybersecurity

Cybersecurity is one of the fastest growing industries....  [Read More]

Interview with Pamela Shortt

In August 2015 and as part of the NCI’s IWICS, Dr. Jane LeClair hosted Pamela Shortt. Pamela has a passion for helping people reach their potential.  She has been part of the NC community college system for almost two decades. It was...  [Read More]

Webinar: Cybersecurity and Government – Federal, State, and Local

Join us for this FREE webinar on September 24, 2015 from 1:00 PM to 2:00 PM (ET) Register for the event now. This webinar will address the unique issues of cybersecurity at the federal, state, and local levels of government. It will...  [Read More]

Webinar: Cybersecurity in the Commercial Facilities Sector

Join us for this FREE webinar on September 23, 2015 from 1:00 PM to 2:00 PM (ET). Register for the event now. Our commercial facilities are constantly under assault by bad actors. This webinar will offer expertise on how seriously they are...  [Read More]

Webinar: Cybersecurity in Transportation

Join us for this FREE webinar on September 9, 2015 from 1:00 PM to 2:00 PM (ET). Register for the event now. Technology and globalization have led to radical changes in transportation systems. Software improves the functionality of devices and systems through...  [Read More]

Cash is the New Plastic

I’m wondering if there is anyone left who has not been hit with credit card fraud. I have…twice in 2014. And while the bank was trying to “sort out the predators” ….I was unable to apply for any new credit for almost...  [Read More]

Small Business Impacts from Ashley Madison Hack

As more information is provided to the public on the recent Ashley Madison data breach, the repercussions expand. The site is used by married people to seek extramarital liaisons. The criminal hackers released email addresses, credit card information, company memos and more...  [Read More]

Create an Endowment

There are numerous initiatives that are currently underway to aid and assist women in joining and staying in the STEM field, and in particular the cybersecurity arena. They come in many forms and flavors, but the one that I am particularly fond...  [Read More]

NIST Recommends International Engagement on Cybersecurity Standards

Earlier this month, the National Institute of Standards and Technology (NIST) published the draft report of the National Security Council Cyber Interagency Policy Committee working group on standardization of cybersecurity.  The report to Congress is a requirement of the Cybersecurity Enhancement Act...  [Read More]