Select Page

WiCyS Security Corner

Dive into cybersecurity news outside of the WiCyS organization. Have a resource we should add? Reach out to us at [email protected].

The “AI” Series | Data Exploration and Visualization

Written by: Prajakta Jagdale |  Director, Offensive Security | Palo Alto Networks This will be the first of many posts covering topics across data analysis, data science, data visualization, and machine learning as they pertain to cybersecurity. While it likely will...

read more

Digital Misdeeds of the Unwitting

All cybersecurity strategies are based on considerations of the acts of sophisticated and highly motivated threat actors like ransomware groups or nation/state-sponsored actors, as they should be. InfoSec teams today rely on highly skilled Red Team professionals to...

read more

’Tis the Season to be Cautious, Fa la la la la, la la la la

Before we get onto the note of caution, for those currently observing Seasonal Holidays around the world, we’d like to wish you all a joyful and safe time with your loved ones. For many of us, it’s the time to exchange gifts, many of them being tech gifts that are...

read more

Great Open Source comes Great Responsibility

The Solarwinds attack of 2020 thrust software supply chain attack techniques once again into the limelight. Threat actors quickly pivoted to leveraging Open Source Software to perpetuate numerous software supply chain compromises. While not a novel means of...

read more

Maryville University: 4 Healthcare Cybersecurity Challenges

Maryville University Tables of Contents Issues faced in healthcare cybersecurity #1: Patient privacy protection #2: Vulnerabilities of legacy systems in healthcare #3: Challenges of IT in healthcare #4: Security breaches in healthcare Modernizing healthcare to reduce...

read more

Multi-Factor Authentication: Battle of the Factors 

Multi-factor authentication (MFA) is an essential mechanism to defend against unauthorized access authentication attempts. Over the years, a number of algorithms and protocols have been developed to promote secure authentication factors. However, not all factors are...

read more

Privacy – Preserving Technology for Secure Communication

Data has become the newest and most valuable currency of the digital age. Increasing amounts of data are being processed and exchanged to aid customizations, targeted advertisement, user profiling and tracking, and myriad other purposes. While regulatory entities are...

read more

*These are resources compiled by WiCyS for the public and our community. WiCyS does not endorse any of these materials.