fbpx Skip to content

Archive for February 2015

The Emerging Science of Digital Forensics

By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal responsibilities associated with cybersecurity. The consumerization of IT and the adoption of cloud, mobile…

Read More

African-Americans and STEM careers: Getting a foot in the door

By Sandra K. Johnson Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realization of such promises has not benefited all segments of the U.S. population, including African-Americans. As…

Read More

U.S. Department of Defense sets its cloud security guidelines

By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines the security requirements that Department of Defense (DOD) mission owners must adhere to when procuring cloud-based services. While the document is very thorough and is…

Read More

Circles are good for the economy

Contrary to what your mother may have told you, going in circles is sometimes a good thing. When it comes to our economy, it is actually a great thing. Throughout history, society has built itself up by transforming raw materials into finished, usable products. This manufacturing process has always been linear in that: Materials (sand,…

Read More

2015 National Chief Information Security Officer Survey

Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information.  The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO). In order to better understand the challenges and concerns…

Read More

Mobile device security: A new frontier for hackers

Recent security breaches have heightened our awareness of cybersecurity issues. The hack and other security breaches have resulted in unprecedented damages. However, the majority of mobile device users have yet to be sensitized to their personal and corporate security risks.Staples For example, a security study found that 69 percent of users store sensitive personal information on their mobile devices.  Examples…

Read More
Crate

Purchase Crate

Shipping and discount codes are added at checkout.

Checkout
Scroll To Top