University of Arizona electrical and computer engineering researchers are training a future cybersecurity workforce and creating bioinspired methods for keeping computers secure.
The Department of Justice published an open letter to Facebook from international law enforcement partners from the United States, United Kingdom and Australia in response to the company’s publicly announced plans to implement end-to-end-encryption across its messaging services.
Dr. Eman El-Sheikh, director of the University of West Florida Center for Cybersecurity, will serve on the newly established Florida Cybersecurity Task Force.
For a long time, it may have seemed like consumers virtually had no power, and that businesses could do anything they want with individuals’ private information with nearly no repercussions – but that time is rapidly expiring. With increased state regulations, it is clear that businesses must step up their security game by pseudonymizing their data, rendering the data unidentifiable, so when that data travels across state lines and organizational boundaries, the data is still protected, as well as the business and its reputation.
Today, the average American leaves the house with a smartphone that has more computing power than the systems that landed humans on the moon. The Internet of Things (IoT) enables refrigerators to tell you that you’re running out of milk and cars to provide assisted driving. The reality is that the knowledge economy is in full swing, and the modern world’s relationship with technology has advanced to a state where nearly all aspects of our daily lives are touched by the internet.
As threats from the cyber and physical realms become increasingly prevalent and complex, enterprise security teams must arm themselves with an integrated approach to security operations—one that incorporates cybersecurity, physical security and advanced technologies such as artificial intelligence (AI) and machine learning.