A Note on the Cybersecurity Problem Space in 2018
A technical note framing the different levels at which cybersecurity problems are encountered.
A technical note framing the different levels at which cybersecurity problems are encountered.
Reprivata developed a cybersecurity solution which could fundamentally change how companies create private, trust-based interconnections with their third-party business partners. Now, how do they attract the right “early adopter” to implement it?
The founders of the Informing Science Institute consider how to ensure that their all-volunteer research and educational institute can be sustained into the future.
The founding dean of the USF College of Pharmacy wonders how technology could be incorporated into the college to further his goal of moving towards “The Pharmacy of the Future”
A CFO worries about cash flow shortages at a college in the Bahamas and how changes to government may endanger the institution.
A martial arts expert applies cyber forensics to identifying sexual predators who run or work at martial arts schools. He worries about the implications of publishing his findings.
A large regional hospital in Florida wrestles with the issues associated with adopting telemedicine standards in an age of electronic health records and increasing compliance concerns.
Tribridge, an award-winning provider of cloud services specifically designed for Microsoft ERP solutions, needs to decide how to move its Health360 platform forward. Of particular concern was deciding how to position it with respect to Microsoft, who supplied the underlying platform on which the application was built.
A client of a security services firm has received an email from the dark web demanding a ransom or it will start selling data it has stolen from the client. The client as asked for the firm’s assistance in paying the ransom. How should the company proceed?
A physicist who studies the human brain has adapted dynamic logic, a machine learning algorithm he developed, to run on a test database of network traffic. The algorithm has proven surprisingly adept at identifying malware traffic. Now he ponders how the project might move forward, given that cybersecurity is entirely outside of his domain of …