Cybersecurity challenges pros to keep ahead of sinister minds

July 2014
Diversity/Careers in Engineering & Information Technology;Jun/Jul2014, Vol. 23 Issue 4, p42
Trade Publication
The article focuses on the challenges posed by cybersecurity to information technology (IT) experts, along with their insights on cybercrime and its impact on IT in the U.S.. The people who offered their views include doctor Douglas Maughan, George Smirnoff, and Kevin Greene. Topics include the study "Estimating the Cost of Cybercrime and Cyber Espionage," the stolen 110 million credit card numbers, and the need for people to be aware of IT and security.


Related Articles

  • Cheat Sheet: What Bankers Need to Know About the $1B Carbanak Heist. Crosman, Penny // Americanbanker.com;2/17/2015, p1 

    Kaspersky Lab has unveiled a cyber-heist in which hackers have already stolen $1 billion from banks across the world. Here's what banks should know about how the hackers did it -- and what institutions can do to protect themselves.

  • THE NEXT COLD WAR. Lawton, Stephen // SC Magazine: For IT Security Professionals (15476693);Apr2012, Vol. 23 Issue 4, p30 

    The article reports on cyber espionage wherein adversaries hire code-writers to create attacks that can run autonomously for years. Countries cited as leaders in state-sponsored cyber attacks against the U.S. include China and Russia. Other nations cited are North Korea, Iran, France and Israel....

  • U.S.-China Cyber-security Agreement Lacks Teeth, Has Holes. Lemos, Robert // eWeek;9/30/2015, p1 

    The article discusses shortcomings of the cyber security agreement and economic espionage between China and the U.S. Topics discussed include failure of agreement in the context of economy and national espionage, the views of Xi Jinping, president of China, on the promotion of domestic...

  • CYBER WARFARE. Kasuri, Zubair // Flare (Pakistan);7/15/2013, p26 

    The article examines whether Pakistan is capable of preventing cyber warfare. It states that the country is a fast growing market in information technology and that there is an increase in cyber crimes, however no one can ensure cybersecurity as cyber criminals also evolve and can even hack...

  • Hunting cybersecurity talent. Keating, Michael // American City & County Exclusive Insight;4/20/2015, p4 

    The article presents some of the cyber threats and data areas that has to be addressed as priorities under the heading of "Security." Topics discussed include security including risk assessment, governance and budget and resource requirements in determining what constitutes in "due care" in...

  • Overview and Analysis on Cyber Terrorism. Saint-Claire, Steve // School of Doctoral Studies European Union Journal;2011, Issue 3, p85 

    There are many forms of terrorism on the Internet. Some are not dangerous enough to be deemed a simple spread of information instead of terrorism. They are simple show of skill and are harmless. Acts of cyber-crimes may involve stealing of money, company secrets, or attacking country's...

  • 5 Lessons Learned. Olejnik, Jeff // Independent Banker;May2014, Vol. 64 Issue 5, p70 

    The article discusses the lessons learned on electronic credit card fraud in the U.S. It states that cybercrime is a sophisticated, organized operation and has a real financial impact. It reveals that easy-to-fix vulnerabilities can lead to big problems problem. Community banks and their...

  • Cyber Defense. Higgs, Michael // Retail Merchandiser;Sep/Oct2013, Vol. 53 Issue 5, p12 

    The article discusses the illegal operation of credit card numbers and personally identifiable information (PII) by the Russian criminal syndicates in the U.S. retail sector as of September 1, 2013. Topics include a report by the security research firm Ponemon Institute LLC showing a company's...

  • Cyber attacks: It's not a matter of if but when. CLARKE, MATTHEW // Insurance & Risk Professional;Jun/Jul2014, p36 

    The article focuses on conducted surveys by accounting firms and information technology (IT) security companies regarding the impact of cyber attacks on large companies such as the Sony PlayStation in April 2011. Topics include the results of the 2013 Norton Cyber Crime Report, the credit card...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics