This note provides a summary of disaster recovery with emphasis on information technology disaster recovery.
A technical note framing the different levels at which cybersecurity problems are encountered.
Reprivata developed a cybersecurity solution which could fundamentally change how companies create private, trust-based interconnections with their third-party business partners. Now, how do they attract the right “early adopter” to implement it?
A martial arts expert applies cyber forensics to identifying sexual predators who run or work at martial arts schools. He worries about the implications of publishing his findings.
A large regional hospital in Florida wrestles with the issues associated with adopting telemedicine standards in an age of electronic health records and increasing compliance concerns.
Tribridge, an award-winning provider of cloud services specifically designed for Microsoft ERP solutions, needs to decide how to move its Health360 platform forward. Of particular concern was deciding how to position it with respect to Microsoft, who supplied the underlying platform on which the application was built.
A client of a security services firm has received an email from the dark web demanding a ransom or it will start selling data it has stolen from the client. The client as asked for the firm’s assistance in paying the ransom. How should the company proceed?
A physicist who studies the human brain has adapted dynamic logic, a machine learning algorithm he developed, to run on a test database of network traffic. The algorithm has proven surprisingly adept at identifying malware traffic. Now he ponders how the project might move forward, given that cybersecurity is entirely outside of his domain of …
A professor in information systems discovers that his personal website has been hacked. Even worse, his ISP has suspended his site because the defacement included a PayPal phishing scheme. This is not the first time this has happened. How should he recover?
After the successful launch of a DBA program for working executives, the program’s academic director ponders whether or not there might be an opportunity to create a cybersecurity doctoral program based on the existing program’s research core.