If It’s Smart, It’s Vulnerable Book written by Mikko Hypponen Book review by Adrian Sanabria Bottom Line I...
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks Book written by Scott J. Shapiro Book review by Hal Gangnath Bottom Line...
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency Book written by Andy Greenberg Book review by Ben Rothke Bottom Line...
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency Book written by Andy Greenberg Book review by Rick Howard Bottom Line...
Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism Book written by Maureen Webb Book review by Helen Patton Bottom Line...
This Is How They Tell Me World Ends: The Cyber Weapons Arms Race Book written by Nicole Perlroth Book review by Larry Pesce Bottom Line I...
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches Book written by Josephine Wolff Book review by Ben Smith Bottom Line I don't...
October 27, 2022 Ohio State Researcher Vimal Buck Make Strides Towards Protecting AI Technology The Columbus Dispatch published an article on October 17th highlighting the work...
Thu, Oct 20 2022 WiCyS Guest Speaker Talk with Dr. Zhiqiang Lin Women in Cybersecurity (WiCys) is hosting a guest speaker talk with Dr. Zhiqiang...