Tag «cybersecurity»

ReliaQuest: Behind Enemy Lines

A client of a security services firm has received an email from the dark web demanding a ransom or it will start selling data it has stolen from the client. The client as asked for the firm’s assistance in paying the ransom. How should the company proceed?

Employing Dynamic Logic in Cybersecurity

A physicist who studies the human brain has adapted dynamic logic, a machine learning algorithm he developed, to run on a test database of network traffic. The algorithm has proven surprisingly adept at identifying malware traffic. Now he ponders how the project might move forward, given that cybersecurity is entirely outside of his domain of …

Grandon.com Got Hacked!

A professor in information systems discovers that his personal website has been hacked. Even worse, his ISP has suspended his site because the defacement included a PayPal phishing scheme. This is not the first time this has happened. How should he recover?

Securing the Muma Journals

How do you balance flexibility and security in deploying a new online journal? Is WordPress the best solution? An information security case that was developed during the launch of the MCR and MBR journals and was also used in a cybersecurity program.