Integrating Cybersecurity Education in the K-12 Curriculum
by Nicholas Foisy on July 25, 2024 at 4:07 PM
Cybersecurity has become a cornerstone of our digital society, influencing every aspect of our lives from personal privacy to national security. Given its importance, integrating cybersecurity education into the K-12 curriculum is not just an option; it is a necessity. But how do we w …
Is a Cybersecurity Degree Worth It? Considering Pros & Cons
by Jeffrey Torrance on July 5, 2024 at 11:30 AM
The modern era has brought with it a heightened need for cybersecurity professionals to protect sensitive data and systems. With cyber threats constantly evolving, the demand for skilled cybersecurity experts is at an all-time high. This brings us to an important question: Is a cybers …
10 Best Undergraduate Cybersecurity Programs in 2024
by Kyle Daun on June 11, 2024 at 10:50 AM
The information presented in this article was meticulously gathered by analyzing top search results and consulting numerous reputable sources. Additional school data was derived from US Department of Education publications, Careers360, and other relevant pages. It is important to note …
Their Risk is Our Risk (Case Study Draft)
by Brian Kelly on April 25, 2024 at 11:02 AM
This case study, created by Compass IT Compliance and commissioned by the Scholarly Networks Security Initiative (SNSI), aims to pinpoint threats to higher education institutions and propose measures to safeguard the integrity of scientific records, scholarly systems, and user persona …
Cyber Safe Scholars: Developing IT Security Awareness Among Students
by Peter Fellini on April 17, 2024 at 10:15 AM
In the rapidly transforming internet era, the significance of cybersecurity emerges as a cornerstone for navigating the online world safely and responsibly, particularly for the younger generation, who are increasingly immersed in online environments. This necessity transcends the rea …
Using the HECVAT to Measure Vendor Risk
by Brian Kelly on September 8, 2022 at 1:00 PM
Not a day goes by without a conversation about third-party risk management. Our clients are being bombarded in all directions; asked by regulators, auditors, their clients, and customers alike to complete third-party risk assessments (SIG, CAIQ, HECVAT).