Identifies key cyber risks that pose a threat to the functioning of Information Technology in the public and private sectors.
Read MoreCyber Threats
Engaging in Cyber Warfare
Defines cyber warfare, justifies the need to establish rules for cyber warfare, and briefly discusses the current cyber war between the United States and China.
Read MoreMalware Analysis: A Look Into the Past and Future
Discusses the importance of understanding the different types and effects of malware and mentions easy steps on how to protect against such threats.
Read MoreProtecting Critical Infrastructure
Discusses the critical infrastructures of the United States, emerging hacking resources, new threats to the smart grid introduced by technological advances, and concludes with recommendations for ways risk managers can mitigate these threats.
Read MoreCloud Computing and Cyber Threats
Discusses the basics of cloud computing, the three major cloud frameworks, as well as looking at some of the cyber threats associated with cloud computing and what companies can do to mitigate these threats.
Read More