Universities That Teach Cyber Security At Risk

The cyber security field is a dynamic, challenging and growing fast. Cyber is a field that needs new people to join the fight.  Earning a bachelor’s degree in cybersecurity has definite advantages although many cybersecurity positions require knowledge beyond  computers.

Top job candidate should know something about business, law, criminal justice, risk, statistics, political science and other disciplines. Learning a foreign language can help get a job in cyber intelligence, which is work that examines foreign threat actors. 

But one big problem is that universities are experiencing is cyberattacks targeted against them.

The University of Kentucky has fought off a month-long cyber-attack that impacted the universities healthcare and caused a system-wide slowdown.According to officials, the disruption was caused by crypto-currency mining malware installed by threat actors on the network in February. The malware caused daily interruptions to everyday functions and triggered temporary failures of th universities computer system.

Currently half of all universities in the UK say they are experiencing cyber-attacks on a weekly basis, and a majority believes that their security research has already been compromised as a result.

Universities that want to nurture and safeguard their cyber security research efforts need to keep two things in mind:

  • Firstly, they need to create a suitable environment for that research to take place in.
  • Secondly, they need to adequately protect both the research itself and the wider organisation from cyber security threats.

Cyber security research is fundamentally important if you want to understand the range of potential threats, then get a well-paid job and learn how you can best protect ourselves against them. But putting that protection in place starts at home for universities that want to discover the next cyber security research breakthrough.

Creating virtual safety mechanisms in the form of professional network segmentation and visibility solutions should be a key priority for any university that is serious about investing in its cyber security research capabilities.

Analysts at the University of Texas have found a way to bamboozle malicious hackers into giving away their secrets. The Deep-Dig method tricks hackers onto a decoy site set up to record whatever sneaky tactics are thrown at it. This information is then fed into a computer, where it is analysed to produce clues on how to identify and fend off future hacking attacks.

In response to the growing need for professionals skilled in the protection of digital information, the University of Alabama is about to set up a degree in cyber security. The University’s board of trustees recently approved the Bachelor of Science degree, which will be offered this Autumn. The degree will be housed in the department of computer science which is part of the College of Engineering.

A quality University/College program will offer students the advantage of taking courses not just in cybersecurity, but also in other topics, including writing courses. Taking courses outside of the college major also helps to build a well-rounded graduate with a strong foundation across multiple disciplines.

FE News:     InfoSecurity Magazine:       InfoSecurity Magazine:    Alabama News:      Greenville Business:   Image: Pexels

You Might Also Read: 

Lancaster University Hit By Data Thieves

 

« Artificial Intelligence, Automation, Training & Jobs
Stay Cyber-Secure Working From Home »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

FireEye

FireEye

FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.

HireVergence

HireVergence

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

Digiserve

Digiserve

Digiserve by Telkom Indonesia is an end-to-end managed solutions provider committed to empowering enterprises in Indonesia.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

V3 Cybersecurity

V3 Cybersecurity

V3 Cybersecurity is a unique company focused on contextualization of security programs from a business perspective. Our mission is to provide enterprise IT Risk Management capabilities.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.