Posts

The University Of Tulsa To Offer Cybersecurity Program


This announcement could not be more timely with all the cyber attacks seen on cities and businesses lately.

The University of Tulsa is adding a new School of Cyber Studies.

Thanks to the new program, students can now get a bachelor’s degree in Cyber Security and a doctorate in Cyber Studies.

TU professor Tyler Moore says it was an easy decision because of the high demand for cyber security jobs across the country.

“To see where we’ve come from then to now, has been pretty inspiring to think that we can have an entire department dedicated to cyber studies,” Moore said.

Moore says there are at least 200,000 cybersecurity job openings right now that businesses are hoping to fill.

TU student Jess Peraza says she jumped at the chance to major in something she is passionate about.

“Cybersecurity is like a booming field right now and a lot of computer scientists are choosing this as their niche so I think it will bring more people in,” Peraza said.

Moore says cybersecurity is comprised of the best TU has to offer. He says labs with servers like these are going to give students the hands-on experience they need to be ready right out of college.

“That’s what’s exciting is that we can really hopefully meet the demand that’s out there for cyber programs that…..we maybe couldn’t have done before,” Moore said.

Moore says some of his best memories when he was a TU student was thanks to the hands-on education, he was getting…and now, more than 20 years later, he hopes to do the same with the next generation of students.

“The reason why I wanted to come back and teach a few years ago was because of the great experience I had as a student, because I got the chance to do hands-on cybersecurity work as a student even then,” Moore said.

Source…

Threat Intelligence Pioneer Joins Cybersecurity Leader onShore Security

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.


Craig Brozefsky returns to onShore Security

CHICAGO – July 29, 2021 – (Newswire.com)

onShore Security, one of the nation’s top Managed Detection and Response (MDR) providers today proudly announced the addition of threat intelligence powerhouse Craig Brozefsky to its growing roster of top talent leading the way in today’s increasingly complex and high-stakes cybersecurity landscape. Brozefsky joins onShore Security’s team as Senior Engineer and brings experience from his previous work on THREATBrain, a malware behavioral analysis engine. This industry-leading work led Brozefsky to a position as Director of Engineering at ThreatGRID and the company’s subsequent acquisition by Cisco. At Cisco, Brozefsky was the principal engineer, working to integrate THREATGRID’s threat intelligence capabilities across the company’s portfolio. He then went on to build and lead the team that developed the Cisco Threat Intelligence Model as an intelligence and security platform for enterprises. 

Brozefsky worked for onShore Security in the ’90s, and his return is part of a larger project for the company. Last month, onShore Security announced its expanding utilization of Elastic technology, which is being further integrated into the company’s operation. In his new role. Brozefsky will be aiding onShore in updating and refining its Elastic store and improving automation and event correlation.

Steven Kent, Chief Technology Officer of onShore Security notes, “We are excited to bring Craig back to onShore; his experience & acute awareness of the security landscape will help us continue to extend industry-leading security offerings for our clients and create an even stronger development environment for our security features. Craig shares our goals of ensuring the most secure data handling experience for our customers, and we are looking forward to growing together.”

Brozefsky explains his background and future with onShore saying, “I started my career in security at onShore; as one of the first internet security and networking service companies in the region, it was a pioneer then, and it continues to be today. My professional path took me into software engineering,…

Source…

Good guy hackers: St. Paul company uncovers companies’ cybersecurity weaknesses

Opt-in to Cyber Safety. Multiple layers of protection for your devices, online privacy and more.


Their mission this night: uncover cyber and infrastructure security weaknesses at Intereum, an office furniture supply company. 

“We worked with this organization to do what we called penetration tests,” said Matt Quinn, Intereum’s vice president of integrated solutions. “They worked on trying to get through the perimeter, through the physical parts of the building … we also had them take some steps around cybersecurity, vulnerabilities.”

“Show you, yep, we were able to get through this door, we were able to bypass this censor,” Halbach said. “And at the end of the day we plugged into your network and took it over.” 

The idea is to beat cyberthieves at their own game before an actual ransomware attack or other threat. 

“Try to look at any available computers that they could get through,” Quinn explains. “Try to get on to our network, once they got into the building, as well as continue just to snoop around where our servers are, just to see if they could get access to our network.”

The team is made up of two parts: One company, RedTeam Security, zeros in on computer systems. Their partner, FoxPoint Security, accesses the building itself. 

“The more integration we have with our networks to our physical locations, the more ways there are to compromise it,” said Bryan Carver, a FoxPoint spokesperson. “If a building per se has a security network that locks the doors, or unlocks the doors, people, property, or operations could be held hostage.” 

“Because if you have the most secure computer network in all the world, but your door’s unlocked and anyone can walk in and steal your laptops, that’s a pretty big issue,” Halbach added. 

Within minutes, both teams are inside — although they’ve triggered an alarm system. 

They quickly locate Intereum’s servers. Equipped with USB drives loaded with a custom code to remotely control the company’s computers, RedTeam finds an unlocked laptop that allows them access. 

“We actually had an employee transition at the time, and that computer was left open and available that evening,” Quinn said. “And, of course, they got access to it, and that, of course, would be a…

Source…

Cyber Security Class: 1 Introduction. Learn Internet Security. CyberSecurity 101