Skip to main content

Stopping DDoS in its Tracks

Sign up for the monthly newsletter

  • Phishing: Beware of those Sneaky, Slimy, Stinky Messages

    George Bailey - May. 04, 2021

    It’s 3 am, you are abruptly awoken from a deep sleep by a banging on your door.  You wipe the sleep from your eyes and glare at your alarm clock, who could that be at this hour, you say to yourse… Read More

  • Securing Mr. Roboto: Cybersecurity in ICS Environments

    Joe Beckman - Apr. 27, 2021

    The February 5, 2021 attack on the Oldsmar, Florida water supply brought the cybersecurity of industrial control systems (ICS) to the front of national attention in the United States. As is often… Read More

  • A Letter to Cybersecurity from an Application Developer

    Mike Johnson - Apr. 20, 2021

    Dear Cybersecurity, I don't get you. I thought we were going to be good friends instead, you hang out with all my other friends. You've changed, I don't recognize you anymore. I know we haven't a… Read More

  • What is Cyber Threat Intelligence?

    Krassimir Tzvetanov - Apr. 13, 2021

    Over the past 8-10 years, the term Cyber Threat Intelligence (CTI) permanently settled in our dictionary. But what is it? Apart from every term containing "cyber" is cool, it does not appear we h… Read More

  • What it Takes to Admin SaaS

    Aaron Bailey - Apr. 06, 2021

    What does it take to administer a SaaS (Software as a Service) application? Well, here are some thoughts. First, you need to know what the software can do. I don't mean the stuff they put on the … Read More

  • What is CMMC?

    George Bailey - Mar. 30, 2021

    Wait, What, another cybersecurity standard to implement?!? Yes, amongst all the available choices from NIST, FIPS, ISO, COBIT, ISACA, PCI, and many others, a new standard has been developed. This… Read More

  • Defense Lives Here: What a former B1G Ten Defensive Player of the Year can teach us about defensive cybersecurity?

    Mathew Trampski - Mar. 16, 2021

    In 2015 Purdue University’s perimeter was secure. The necessary controls in place demonstrated to our most sophisticated adversaries that nothing would be “easy” from the outside. To match this s… Read More

  • Moving a Workforce Out Of Office

    Mike Johnson - Mar. 09, 2021

    Raise your hand if the current pandemic climate has accelerated a change or outright shift in the way you do business. Keep your hand raised if you weren’t 100% prepared for this shift. For those… Read More

  • Why Do I Need a Cybersecurity Risk Assessment?

    Matthew Crain - Mar. 02, 2021

    Every cybersecurity program I’ve ever seen lists risk assessment as its first step, a foundation upon which all the other security measures will build. But with so many potential fires to fight, … Read More

  • Understanding the Solarwinds “Sunburst” Hack

    Joe Beckman - Feb. 23, 2021

    You could be forgiven if you rolled your eyes and clicked through to the next story when you first learned of the Solarwinds hack. Cybersecurity incidents have become commonplace events and if yo… Read More

  • Welcome to the cyberTAP

    Mathew Trampski - Feb. 09, 2021

    I’m a lucky guy, what else can I say! Good health, good family, and a good job… The world faces the shifting sands of an ever-changing cybersecurity landscape: new strains of ransomware popping u… Read More

Return to main content

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2020 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Technical Assistance Program

Trouble with this page? Disability-related accessibility issue? Please contact Technical Assistance Program at