Breaking News:


Add to Favorites | Subscribe | Share


  • (Press "esc" to clear)




Computer Security, Cyber Security, Security Assessment Plans, Security Control Assessment Procedures, FISMA, Federal Information Security Management Act

Updated Computer Security Publication Focuses on Security Assessment Plans

NIST has published an updated set of guidelines for developing security assessment plans and associated security control assessment procedures that are consistent with the Federal Information Security Management Act (FISMA).


Channels:, Business Ethics, Telecommunication, Technology, China, Ethics, Hacking, Computer, Internet, Censorship

Searching for Answers: Ethical Considerations of Google's Presence in China

When Jim Caccamo, Ph.D., an expert in computing and telecommunications technology ethics, heard of Google’s recent struggles in China, he knew he’d need to update the curriculum for the Technology, Society and Christian Ethics course he teaches at Saint Joseph's University in Philadelphia, Pa. The Internet heavyweight recently rerouted all searches from its heavily censored mainland China search engine to its more open Hong Kong engine in the wake of a massive hack on its system in December, which some have attributed to the Chinese government. “Not a lot happens on the Web in China that the government isn’t aware of, and it’s hard to believe they didn’t know about the hacking that happened over the winter,” said Caccamo, who is an associate professor of theology.


Law and Public Policy


cyber attack, Cyber Security, Terrorism, Cyber Thieves

Cyber Security Expert Available to Discuss New Threat Warnings

Andrew Macpherson, research assistant professor of justice studies at the University of New Hampshire Justiceworks program and director of the Technical Analysis Group, is available to discuss new warnings about the increased threat of cyber attacks.



Cybersecurity, Computer Science, NSF, automated reasoning, Cryptography, Hackers, National Security, Cyberattack, Clarkson University, Christopher Lynch, Software Development, Mathematics

Software to Test Cybersecurity Systems for Flaws

A Clarkson University professor is developing software programs that will test cybersecurity systems for flaws before they become operational. The National Science Foundation is funding the $1.2 million project, which also involves four other research centers.



China, China Relations, Google, Cyber Security

Indiana University Expert Available to Discuss Ongoing Impact of Google/China Dispute


International discussion and diplomacy continues in light of Google's announcement last week that it may pull out of China over concerns about censorship and security. Today (Jan. 21). a top Chinese official announced that the threat should not affect China's relations with the United States. Scott Kennedy, director of the Research Center on Chinese Politics and Business and an associate professor of political science and East Asian languages and cultures, is available for comment.



Creativity, inventive, Innovation

Cybersecurity Expert Stays Creative Baking Bread


Is there a recipe a scientist might follow to spur creativity and cook up new discoveries? Cyber security expert Kevin Fu says experimenting with flour, salt and yeast to bake artisanal bread helps him keep creative juices flowing and creates space in which to mull over thorny research problems.

Chat now!