The Biggest 2021 Cybersecurity Predictions

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

2021 Trends

2020 saw a whole host of new cybersecurity threat vectors that no one could have foreseen. Covid-19 brought forth complications and cyber-attack opportunities previously unprecedented. 2021 will have its own set of both problems, as well as developments. However, in many ways, the issues of 2021 will be the fallout of 2020. Here are predictions … Read more

Haywood County School Latest in String of Virtual Learning Cyberattacks

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Distance Learning

Across the country, many students are going back to school. A larger portion of the country’s youth are learning remotely. However, a cyber attack in North Carolina’s Haywood County School district puts the viability of online learning into question. According to the local news, a ransomware attack shut down the schooling district for the entire … Read more

From the Winter 2020 Issue

Enhancing Cybersecurity with Artificial Intelligence

Author(s):

Philip Chan, Ph.D., University of Maryland UMUC UMGC / U.S. Army Futures Command (AFC)

Artificial Intelligence

Daily human life is impacted by Artificial Intelligence (AI). More and more enterprises are using AI for their needs; the time sets to analyze the right implementation of AI in the area of the cybersecurity field. There are many positive uses of AI for cybersecurity applications. Biometric applications are typically and increasingly used in commercial … Read more

What is the Difference Between Artificial Intelligence, Deep Learning, and Machine Learning?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Artificial Intelligence, Machine Learning, Deep Learning, Data Mining, Brain in Binary, vaporwave color scheme

Artificial Intelligence has become one of the most overused buzzwords in the cybersecurity field. Cybersecurity buzzwords gain more traction as the world of cybersecurity becomes more omnipresent in our cultural consciousness. Events like the Marriott Hotel Breach and the Facebook User Data scandal have created an atmosphere of paranoia. However, in the wake of an … Read more

The Netflix Sharing Problem

Author(s):

Zia Hayat, CEO, Callsign

Red Head Woman watching Netflix on her Smart TV, Watching Daredevil, Options on the Bottom of TV like Daredevil, Black Mirror, Peaky BLinders, Glitch, The Crown, etc.

Netflix Has a Problem With Password Sharing. We have all heard the story of the college grad using his former roommate’s parents’ Netflix password. We all know the ex-boyfriend binging his favorite shows with his ex-girlfriend’s account credentials. Many consider the sharing economy a positive thing. However, Netflix, Hulu, Amazon, HBO and others are literally … Read more

How to use Tor Safely

Author(s):

Julia Sowells, ,

Welcome to Tor Browser tab is open

Browsing Anonymously  Tor, as many internet users may know, is a free software that helps establish anonymous communication between computers. The name originates as an acronym for the software project ‘The Onion Router’. ‘The Onion Router’ helps users conceal their location and usage and protects them from people conducting traffic analysis or network surveillance. This … Read more

From the Spring 2015 Issue

Lone Star Rising: San Antonio’s Cybersecurity Boom

Author(s):

Jim Brodie Brazell, CEO, Armour.io

San Antonio may not be the first city you think of when you think cybersecurity, but it might be time to start. The Alamo City has a long history of cybersecurity innovation and development, being the birthplace of the first analog computer used for gas pipelines in 1955, the first protocol for the Internet of … Read more