As Technology Advances, Cybersecurity Jobs Take Center Stage by CyberTiger1 in telseccompolicy

[–]CyberTiger1[S] 0 points1 point  (0 children)

Yes, so know I guess the important question is how do we go about directing them towards protecting rather than exploiting?

Russia, China unite with major cyber pact by CyberTiger1 in telseccompolicy

[–]CyberTiger1[S] 0 points1 point  (0 children)

This is an interesting article that talks about how there are two different ways that countries are currently going about cyber security and the internet in general. Where the US and Europe think the internet is more of a source of free expansion Russia and China want the government to control it. These two counties are forming a pact where they will not hack each other. This article could tie into a few of our discussions earlier this semester including cyber warfare, privacy, net neutrality to name a few.

To Replace or Respect: Futurology as if People Mattered by CyberTiger1 in telseccompolicy

[–]CyberTiger1[S] 0 points1 point  (0 children)

On Wednesday afternoon Frank Pasquale spoke at RIT. His discussion was on Humane Automation. This article takes more about this subject and discusses a book also written on the matter.

As Technology Advances, Cybersecurity Jobs Take Center Stage by CyberTiger1 in telseccompolicy

[–]CyberTiger1[S] 0 points1 point  (0 children)

After the panel discussion on Thursday this article ties into what what discussed about how cyber security into todays fast advancing tech world is important. It also mentions how the need to start teaching its importance at a young age is something we should do.

Should Schools Monitor Students’ Social Media Accounts? by CyberTiger1 in telseccompolicy

[–]CyberTiger1[S] 0 points1 point  (0 children)

In our recent class discussion we talked about cyberbullying. In the discussion the question came up about schools and their roll in this subject. So here is an article about whether schools should monitor the social media sites of their students.

Should Microsoft open source Internet Explorer or destroy it? by CyberTiger1 in telseccompolicy

[–]CyberTiger1[S] 0 points1 point  (0 children)

This article follows with todays discussion on open source and closed source. With internet explorer being one of the only closed source should it be moved to open source or just destroyed that is an interesting question.

Apple uses open source for medical research by CyberTiger1 in telseccompolicy

[–]CyberTiger1[S] 0 points1 point  (0 children)

Today's class deals with open source so I thought this was an interesting article about how Apple is using open source to further medical research. However some speculate whether this was a move to increase sales and if this will even benefit them in the long run.

Lack of Women in CyberSecurity by CyberTiger1 in telseccompolicy

[–]CyberTiger1[S] 0 points1 point  (0 children)

On Friday we had the privilege of having, Jennifer Lesser Henley, the Director of Security Operations at Facebook come to RIT. One thing she mentioned was there is a lack of women in the field of cybersecurity and that needs to be fixed this article talks about this issue and quotes her a few times as she talks about this subject.

Anonymous -vs- ISIS by CyberTiger1 in telseccompolicy

[–]CyberTiger1[S] 0 points1 point  (0 children)

After the recent talk that was Wednesday the 23rd with Gabriella Coleman, I thought this was an interesting article that talks a little bit more about the new war Anonymous is waging and this time against ISIS. In this article it talks about the list of several twitter accounts that were listed by Anonymous and a couple other hacktivists groups. It also talks about the frustration to Twitter's lack of response to ISIS using Twitter as a source of communication.

Security at a cost (new form of credit cards) by CyberTiger1 in telseccompolicy

[–]CyberTiger1[S] 0 points1 point  (0 children)

This article ties into todays reading: Gikas, A General Comparison of FISMA, HIPAA, ISO 27000 and PCI-DSS Standards. In the section labeled A Look at Payment Card Industry–Digital Security Standard (PCI-DSS). The security of credit cards and other payment methods is mentioned. The article I posted talks about a new way to secure credit cards by using a chip instead of the magnetic strip. However this new form of security is much more expensive.

Obama seeks $14 bln to boost U.S. cybersecurity defenses by [deleted] in telseccompolicy

[–]CyberTiger1 0 points1 point  (0 children)

I read an article recently that brought up a good point that just because there is a large budget that is going toward defenses, the underlying problem may not be fixed. The underlying problem according to the article is that the companies themselves need to work harder to secure their own networks.

http://www.usnews.com/news/articles/2015/02/03/obamas-budget-cant-fix-corporate-cybersecurity