

<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/">

    <channel>
        <title>cyberTAP Blog</title>
        <atom:link href="https://cyber.tap.purdue.edu/blog/feed/" rel="self" type="application/rss+xml" />
        <link>https://cyber.tap.purdue.edu/blog/</link>
        <description>cyberTAP Blog | The latest in cyber news and articles</description>
        <lastBuildDate>Wed, 11 Mar 2026 03:00:54 -04:00</lastBuildDate>
        <language>en-US</language>
        <sy:updatePeriod>weekly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
            <item>
                <title>Haunted Networks &amp; Ghosts in Machines: Cybersecurity’s Spooky Side </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/haunted-networks-ghosts-in-machines-cybersecurity-s-spooky-side/                </link>
                <pubDate>Fri, 31 Oct 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/haunted-networks-ghosts-in-machines-cybersecurity-s-spooky-side/</guid>
                <description><![CDATA[Even when we think that viruses are gone, worms have been eliminated, and cybercriminals taken care of, traces can still linger. Just because we can’t see them, doesn’t mean they are gone for good. Haunted networks are comprised of lost code fragments, forgotten accounts, and malware that just won’t quit. Traces of malware can be left behind, which means they can reemerge. Think of it as ghosts of malware past. &#160;
Conficker &#160;
Also known as Downup and Kido, was a worm that targeted Microsoft Windo...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/3oxnlysb/gemini_generated_image_yy0ho0yy0ho0yy0h.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Quick Guide: Cybersecurity for College Students </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/quick-guide-cybersecurity-for-college-students/                </link>
                <pubDate>Thu, 30 Oct 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/quick-guide-cybersecurity-for-college-students/</guid>
                <description><![CDATA[Continuing with our quick guide series, today we’ll be going through some smart habits and safety tips for current college students. While this is aimed at college students living and working on a traditional campus, the tips provided here can be used by virtually anyone, even fully online students. Today’s college students are at risk of cybercrime primarily because of how much time they spend online. It isn’t just their assignments that are submitted virtually, but almost all of their personal...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/jbcjhoci/gemini_generated_image_vbe6ypvbe6ypvbe6.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Quick Guide: Cybersecurity for Teens </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/quick-guide-cybersecurity-for-teens/                </link>
                <pubDate>Tue, 21 Oct 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/quick-guide-cybersecurity-for-teens/</guid>
                <description><![CDATA[Today&#39;s teens are more connected to the digital world than ever before. They aren’t just on social media; they’re online gaming, shopping, and messaging. Even if your teen isn’t on social media,&#160;their schoolwork is done through online portals. Unfortunately, they are targeted by cybercriminals constantly. Young people have a tendency to share more online, making them an easier target and because they are young, cybercriminals rely on their limited knowledge of scams. Because a lot of their lives...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/suzhs2fl/gemini_generated_image_a8b0ona8b0ona8b0.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Quick Guide: Cybersecurity for Execs </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/quick-guide-cybersecurity-for-execs/                </link>
                <pubDate>Tue, 14 Oct 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/quick-guide-cybersecurity-for-execs/</guid>
                <description><![CDATA[Executives today take on a lot. They spearhead their organization and often lead their industry on a massive scale. Unfortunately, this makes them primary targets for cybercriminals. Essentially, if a cybercriminal can get you, as an executive, to fall prey to their scam then they have a pretty good chance at also completing attacks on all the other levels of your organization.&#160;&#160;
This is why it is especially important for executives to have a grasp on threat prevention.&#160; One weak link at the top...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/s1en2xzw/gemini_generated_image_zaxnayzaxnayzaxn.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Quick Guide: Cybersecurity For Seniors </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/quick-guide-cybersecurity-for-seniors/                </link>
                <pubDate>Tue, 07 Oct 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/quick-guide-cybersecurity-for-seniors/</guid>
                <description><![CDATA[Cybersecurity matters at every age. Older generations are currently facing a multitude of challenges in this new age of technology. The adjustments that they need to make to participate in an online world are difficult and may even feel impossible. Unfortunately, this puts them at a greater risk for online threats that they might not even realize are out there.&#160;&#160;&#160;
Why do these threats exist for seniors?&#160;
There is no doubt that generational differences impact how we use technology. So, why has it...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/42zpwojd/gemini_generated_image_epbl37epbl37epbl.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Quick Guide: Cybersecurity for Kids </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/quick-guide-cybersecurity-for-kids/                </link>
                <pubDate>Wed, 01 Oct 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/quick-guide-cybersecurity-for-kids/</guid>
                <description><![CDATA[Kids today are born into a fully digital world; they won’t know a life without the modern-day conveniences of technology. From tablets, to TV, to phones, kids have access to just about anything you can think of. So, the question becomes, how do we keep them safe from the dangers of being online? This article will provide you with easy, actionable tips on how to protect your children from all kinds of online threats, even the ones you might not even realize are out there.&#160;&#160;
Where are the threats?...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/bvpcmnqb/gemini_generated_image_ed95vted95vted95.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Purdue cyberTAP Awarded Nearly $250,000 by the Center for Internet Security.</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/purdue-cybertap-awarded-nearly-250-000-by-the-center-for-internet-security/                </link>
                <pubDate>Wed, 25 Jun 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Eric Engle]]></dc:creator>
                    <category><![CDATA[cyberTAP News]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/purdue-cybertap-awarded-nearly-250-000-by-the-center-for-internet-security/</guid>
                <description><![CDATA[West Lafayette, IN – Purdue University’s Cyber Technical Assistance Program (cyberTAP) is honored to announce that we have been selected as the 2025 recipient of the Alan Paller Laureate Program grant from the Center for Internet Security (CIS&#174;). This substantial award of nearly $250,000 will significantly bolster our efforts to strengthen cybersecurity resilience across rural electric cooperatives and other underserved critical infrastructure providers, making a tangible difference in the fight...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/4lkp3qbb/adobestock_1282519507.jpeg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>The Business Impact of a Breach: What Every Exec Needs to Know Before the Headlines Hit </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/the-business-impact-of-a-breach-what-every-exec-needs-to-know-before-the-headlines-hit/                </link>
                <pubDate>Tue, 13 May 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/the-business-impact-of-a-breach-what-every-exec-needs-to-know-before-the-headlines-hit/</guid>
                <description><![CDATA[It&#39;s not if, but when. Data breaches happen daily, and the reality is that one might be closer to your organization than you may think. Every executive should be taking the proper steps to prepare and prevent a cyberattack and today we are going to explain why. &#160;
Let&#39;s start by outlining the business, financial, legal, and reputational consequences of data breaches. There are a few steps that you can take today that will be your key to success before a crisis unfolds.&#160;
The True Cost of a Breach&#160;...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/f2wj3xie/gemini_generated_image_or6hhaor6hhaor6h.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Newest HIPAA Rules</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/newest-hipaa-rules/                </link>
                <pubDate>Thu, 24 Apr 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/newest-hipaa-rules/</guid>
                <description><![CDATA[What is HIPAA &amp;amp; What Does it Have to do with Me?&#160;
Before we take a look at the new proposed HIPAA rules, let&#39;s cover what HIPAA actually is. The well-known acronym stands for Health Insurance Portability and Accountability Act of 1996. This act included many things when it first came into effect and over the years, as you may expect, there have been plenty of adjustments made to the rules surrounding HIPAA. HIPAA’s goal is to protect protected health information (PHI) as well as establish be...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/bxfj52w3/hipaa-civil-monetary-penalties-2021.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>What Do You Mean New CMMC Updates? </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/what-do-you-mean-new-cmmc-updates/                </link>
                <pubDate>Thu, 10 Apr 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/what-do-you-mean-new-cmmc-updates/</guid>
                <description><![CDATA[Prior to the beginning of this year the Department of Defense released a new set of Cybersecurity Maturity Model Certification (CMMC) guidelines. &#160;
So, what is the CMMC?&#160;
The CMMC program is a way to verify that contractors have taken the correct security measures in order to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). &#160;
FCI is any information or data that is provided by or for the government. This information is not to be shared with the public. For...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/qhclh11e/gemini_generated_image_agjvu7agjvu7agjv.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Women in Cyber Today </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/women-in-cyber-today/                </link>
                <pubDate>Thu, 27 Mar 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/women-in-cyber-today/</guid>
                <description><![CDATA[Thanks to the accomplishments of the pioneers before them, today’s women in cybersecurity are making leaps and bounds toward a more secure future. Let’s take a look at some of the most influential women in cyber today and what they are doing to shape the industry and the future.&#160;&#160;&#160;
Theresa Payton&#160;&#160;
Under the Bush administration, Theresa Payton served as the first female Chief Information Officer for the White house. Her role was crucial in carrying out the first 100% all-digital photography and ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/12ajv00v/screenshot-2025-03-27-104932.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Women in Cyber: The 80s Era </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/women-in-cyber-the-80s-era/                </link>
                <pubDate>Thu, 13 Mar 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/women-in-cyber-the-80s-era/</guid>
                <description><![CDATA[Today’s focus will be on the 80s era of computer science, a pivotal time for our field. The decade seemed to bring discoveries daily with the blossoming internet and the development of new programming language, it was the perfect time to enter the space.&#160;&#160;
Dorothy Denning &#160;
Dorothy Denning, a graduate of Purdue University, has been widely recognized for her pioneering efforts in information security. After earning her PhD, Denning’s career started here, at Purdue, as an assistant and then associ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/cvibj51t/screenshot-2025-03-13-104322.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Women In Cyber: The NASA Years </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/women-in-cyber-the-nasa-years/                </link>
                <pubDate>Wed, 12 Mar 2025 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/women-in-cyber-the-nasa-years/</guid>
                <description><![CDATA[NASA is known as one of the greatest pioneers in the pursuit of knowledge in our modern era. Over and over, we hear about their success in the exploration of space and their advancements in the field of technology. The simple truth is that even the most innovative of companies still refused to acknowledge the accomplishments of women in these spaces for decades. It has often been the case that we learn about women&#39;s contributions to space decades after they have actually happened. To give some b...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/mlfi5oql/screenshot-2025-03-04-111315.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Women In Cyber: The Beginnings </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/women-in-cyber-the-beginnings/                </link>
                <pubDate>Tue, 04 Mar 2025 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/women-in-cyber-the-beginnings/</guid>
                <description><![CDATA[Ada Lovelace&#160;&#160;
Ada Lovelace was a mathematician and writer in the early 1800s, best known for her work on the Analytical Engine. During her career she worked with Charles Babbage, who developed the concept for the first digital programmable computer. She was a highly educated woman for her time and took immense care in her studies, to which she devoted most of her time. By the time she passed at only 36, she had contributed to some of the most important research in our field. Her notes on the An...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/3sflq2qo/screenshot-2025-03-04-105023.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Hacktivism: Scambaiting </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/hacktivism-scambaiting/                </link>
                <pubDate>Sun, 12 Jan 2025 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/hacktivism-scambaiting/</guid>
                <description><![CDATA[To close out our series on hacktivism, we delve into the world of scambaiting, an online practice where internet vigilantes attempt to turn the tables on hackers and protect potential victims. The goal of the scam baiters often goes beyond just wasting a scammer’s time. The goal of scambaiting is to gather as much information as possible to expose the scam. Scam baiters pose as a victim, pretending to go along with the scammer until they have a sufficient amount of information about the scam to ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/4z3kvzdf/ed5dca60-f22a-4ed7-94ac-8d110e895dd7.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Hacktivism: Anonymous </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/hacktivism-anonymous/                </link>
                <pubDate>Thu, 19 Dec 2024 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/hacktivism-anonymous/</guid>
                <description><![CDATA[Origin&#160;
The hacktivist group Anonymous was founded in 2003 on an imageboard, 4chan, which was a forum where users could anonymously post images and discussions. The name Anonymous originated from the default username that new chat room users were given upon entry to 4chan. What started out as a discussion board for shared interests quickly evolved into a trolling and cyberbullying group. By 2006, they began hacking and going after well-known individuals like radio show hosts. But it wasn’t until...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/mmkbofux/9d40ee86-8630-4194-a6b7-312b4226e898.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Hacktivism: DarkSide Hacking Group</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/hacktivism-darkside-hacking-group/                </link>
                <pubDate>Thu, 12 Dec 2024 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/hacktivism-darkside-hacking-group/</guid>
                <description><![CDATA[&#160;DarkSide is a hacking group believed to be based out of Russia. They provide ransomware as a service accompanying their frequent high-profile attacks. First spotted in 2020, the group is fairly new, and act mostly as ransomware sellers with other large hacking groups as their clientele.&#160;&#160;
Structure&#160;
Darkside has by far the most unique business structure we have seen yet. They work by gaining affiliate subscribers. These subscribers consist of heavily screened hackers and hacking groups. Once ac...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/wxip5wyn/67b0ebfe-2690-424f-8283-e9f618b6486e.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Hacktivism: The Short Life of LulzSec</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/hacktivism-the-short-life-of-lulzsec/                </link>
                <pubDate>Thu, 05 Dec 2024 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity CyberSecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/hacktivism-the-short-life-of-lulzsec/</guid>
                <description><![CDATA[Origins&#160;
LulzSec came onto the scene in 2011 after their first recorded hack against Fox.com&#39;s website. ‘Lulz’ stands for laughs while ‘sec’ is shorthand for security essentially meaning every time the attack, they are ‘laughing at your security’. They pulled ‘lulz’ from the pronunciation of the popular initialism ‘lols’. The founders, Hector Monsegur and Mustafa Al-Bassam were hackers in their own right before banning together to create LulzSec which at its peak only had a total of six confirme...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/tzolv40i/lulzsec-logo-top.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Hacktivism: WikiLeaks</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/hacktivism-wikileaks/                </link>
                <pubDate>Thu, 28 Nov 2024 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/hacktivism-wikileaks/</guid>
                <description><![CDATA[WikiLeaks is a nonprofit media organization founded in 2006 by Julian Assange, Kristinn Hrdnsson, and Danial Mathews. The site is used to publish leaked documents from governments, corporations, and other large entities. Originally founded in Australia the organization eventually, in 2010, became registered in Iceland under the Sunshine Press Production ehf. This massive project was not a solo affair. The site was established with the help of journalists and activists&#160;all over the world with Ass...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/vdob3c3a/wikileaksimage.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Hacktivism: The Chaos Computer Club</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/hacktivism-the-chaos-computer-club/                </link>
                <pubDate>Thu, 21 Nov 2024 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/hacktivism-the-chaos-computer-club/</guid>
                <description><![CDATA[Hacktivism: The Chaos Computer Club&#160;&#160;
The Chaos Computer Club, founded in 1981, is Europe’s largest association of hackers. As an organization they stand for ‘freedom of information’ and aim to provide ‘information about technical and societal issues’ to the public. The club currently advocates for a long list of social issues including transparency in government, the human right to communication, and universal access to computers and technological infrastructure. With such a wide range of inter...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/fyqdv32z/cccarticle-image.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Hacktivism: The Cult of the Dead Cow</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/hacktivism-the-cult-of-the-dead-cow/                </link>
                <pubDate>Thu, 14 Nov 2024 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/hacktivism-the-cult-of-the-dead-cow/</guid>
                <description><![CDATA[What is the Cult of the Dead Cow?&#160;
The Cult of the Dead Cow, founded in 1984, started as a group of like-minded hackers looking to improve their skills. As the group developed, they pivoted towards movements that would later be known as hacktivism, but it wasn’t until 1996 when a cDc member coined the term in an email to the group.&#160;
Origins&#160;
The group was established at the abandoned Farm Pac slaughterhouse, located in Texas, by three main members, Franken Gibe, Sid Vicious, and Grandmaster Ratt...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/jrthouix/19976c2a-40fc-4a8b-92f7-699a15e47dd0.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>What is Hacktivism?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/what-is-hacktivism/                </link>
                <pubDate>Thu, 07 Nov 2024 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/what-is-hacktivism/</guid>
                <description><![CDATA[The term hacktivism has been a bit of a buzz word for the past couple of decades, falling in and out of popularity in accordance with the number of politically motivated hacks that grab media attention. There is no doubt that this word carries some weight in our industry, but what does it actually mean?&#160;
Definitions&#160;
Hacktivism has a few definitions; it really depends on who you ask. Each definition carries its own set of boundaries. In its purest form, hacktivism is an act of civil disobedience...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/3e2jy1ga/whatishacktivismimage.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>The Ashley Madison Hack</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/the-ashley-madison-hack/                </link>
                <pubDate>Fri, 01 Nov 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/the-ashley-madison-hack/</guid>
                <description><![CDATA[Hacking almost always results in the release of personal information. Whether that be credit card numbers, social security numbers, or other sensitive data, leaks happen all the time. In the case of the Ashley Madison hack, more than just personal information was leaked. In fact, over 2,500 users of the website, Ashley Madison, had their extramarital affairs exposed to the world.&#160;&#160;
In case you don’t know, Ashley Madison is a website that advertises itself as a networking platform for affairs. Th...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/0tmhjxmu/gemini_generated_image_g2thqbg2thqbg2th.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>AI As A Tool</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/ai-as-a-tool/                </link>
                <pubDate>Mon, 28 Oct 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/ai-as-a-tool/</guid>
                <description><![CDATA[What AI Looks Like Day to Day&#160;
AI is an ever-evolving field, it seems that every day there is something new in the works. The topic of AI can get pretty complicated pretty quickly. So, realistically, what does AI look like for everyday use? Well, it might be right under your nose. There are a lot of things that we use every day that are powered by AI behind the scenes. Search engines, navigation systems, and digital assistants are just a few ways AI slips into our everyday life. You may not even...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/0ulhshhy/gemini_generated_image_4t8i114t8i114t8i.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>The Dennis Kucinich CBS News Hack</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/the-dennis-kucinich-cbs-news-hack/                </link>
                <pubDate>Fri, 25 Oct 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/the-dennis-kucinich-cbs-news-hack/</guid>
                <description><![CDATA[Hacking, in most cases, is a very selfish act. Most hackers are in it for the money or the information they can turn into money. But in some cases, hackers commit cybercrime because they believe it is for the ‘greater good’. However, even these hacks boil down to the desire to spread a personal agenda. One example of such a hack is the CBS News hijack involving the promotion of Dennis Kucinich’s campaign for president. You might be wondering why a politician would even want to hijack one of the ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/hvbodhlp/dennisjucinicharticle.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>How Not to Take the Bait When it Comes to Phishing</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/how-not-to-take-the-bait-when-it-comes-to-phishing/                </link>
                <pubDate>Mon, 21 Oct 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/how-not-to-take-the-bait-when-it-comes-to-phishing/</guid>
                <description><![CDATA[Phishing is one of the most common forms of cybercrime, with around 3.4 billion phishing emails sent each day it is nearly impossible to avoid. The good news is that falling victim to these scams can be prevented by educating ourselves on what they look like and how to report them. But first, it&#39;s important to understand what phishing actually is.&#160;
&#160;
What is Phishing&#160;
Phishing is a type of cyber-attack that occurs through telecommunication channels like email, text messaging, or phone calls. A f...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/nubdxyfz/gemini_generated_image_p3qje6p3qje6p3qj.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>The Triton Malware Attack </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/the-triton-malware-attack/                </link>
                <pubDate>Fri, 18 Oct 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/the-triton-malware-attack/</guid>
                <description><![CDATA[Completely unsolved cybercrime cases are relatively rare. Normally when an attack ensues, one of the most important proceedings is to trace it back to the attacker. This is especially important when looking into dangerous malware. However, the Triton Malware attack of 2017 is one of the most dangerous cases of malware ever seen, and it has gone completely unsolved.&#160;
What are SIS?&#160;&#160;
In order to understand this malware, we first have to understand Safety Instrumented Systems (SIS). These systems a...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/qupowpt2/tritonarticleimage.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Why Are Software Updates So Important?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/why-are-software-updates-so-important/                </link>
                <pubDate>Mon, 14 Oct 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/why-are-software-updates-so-important/</guid>
                <description><![CDATA[The importance of keeping your software up to date cannot be stressed enough. Often, we find ourselves putting off these updates because it can be inconvenient to be without our devices for the period of time the update requires. We often hit the ‘remind me later’ button over and over until we find the perfect time to set down our devices. However, software updates are probably more important to your device’s safety than you think.&#160;&#160;
Maybe you think that updates, especially on your phone, are ju...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/ua0jzi3d/gemini_generated_image_jrs54jjrs54jjrs5.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>The Mystery of the WANK Worm</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/the-mystery-of-the-wank-worm/                </link>
                <pubDate>Fri, 11 Oct 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/the-mystery-of-the-wank-worm/</guid>
                <description><![CDATA[In 1989, Galileo, a nuclear-powered spacecraft created by NASA, was set to launch. Its existence was controversial having been announced in the wake of the Challenger Disaster, but that wasn’t the people’s biggest concern. They were far more worried about the word nuclear. Of course, the cold war was still going on and the constant fear of nuclear war was on everyone&#39;s mind. So, it wasn’t too surprising when an unknown group decided to try and intervein. &#160;
What was the Wank Worm?&#160;
The Wank worm ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/cpyo2hce/wankwormimage.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Multi-Factor Authentication</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/multi-factor-authentication/                </link>
                <pubDate>Mon, 07 Oct 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/multi-factor-authentication/</guid>
                <description><![CDATA[To expand on our discussion about secure passwords from last week, let’s look at multi-factor authentication. Multifactor has only been around for about twenty years, but that&#39;s a good chunk of the fifty years that personal computers have existed. However, the idea of multifactor has been around far longer. It exists in the everyday world. When you have to bring two forms of identification to the DMV or your employer, that&#39;s multi-factor in the physical world. Only recently has it become a huge ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/ad2ai3x5/gemini_generated_image_2q30zo2q30zo2q30.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Broadcasting Masks and Mayhem</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/broadcasting-masks-and-mayhem/                </link>
                <pubDate>Fri, 04 Oct 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity CyberSecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/broadcasting-masks-and-mayhem/</guid>
                <description><![CDATA[Welcome to spooky season, we are so glad you could join us for our October series on unsolved cybercrimes! While it might be comforting to think we know the origin of every instance of malicious activity, it’s simply impossible. For the next month we will be going through some of the biggest unsolved cybercrimes, how they came to be, and why they still sit unsolved. Starting off with one of the most memorable and widely shared instances of unsolved cybercrime, we have the Max Headroom hijacking ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/i4ipb5bm/maxheadroomarticle.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Password Security and Password Managers</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/password-security-and-password-managers/                </link>
                <pubDate>Wed, 02 Oct 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/password-security-and-password-managers/</guid>
                <description><![CDATA[Ensuring proper password safety is a never-ending task, mostly because the rules seem to keep changing. The rules used to seem easy; create a password you’ll remember. Oh wait, that’s too easy, try to add in some different characters. Wait no, now you need numbers, letters, and special characters. Actually, scrap that, just make it long. Feeling confused, maybe a little cheated? Well, here’s the reality of today’s password rules... you actually need all of those things.&#160;&#160;
Today it is easier than...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/1phoo2sm/gemini_generated_image_3jkg4a3jkg4a3jkg.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title> Where are we now?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/where-are-we-now/                </link>
                <pubDate>Tue, 17 Sep 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/where-are-we-now/</guid>
                <description><![CDATA[Even after decades of development in our field, one thing stays consistent, change. There are always new threats, new vulnerabilities, new fixes. The only thing that stays the same is that things are always changing. This ever-evolving landscape is what makes cybersecurity so unique, and so important. We work tirelessly to stay ahead of it, whatever that looks like. While it is important to understand how our field has developed over these decades, it is just as important to understand the most ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/3qiowvdr/pexels-pixabay-60504.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>WannaCry?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/wannacry/                </link>
                <pubDate>Tue, 10 Sep 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/wannacry/</guid>
                <description><![CDATA[The WannaCry ransomware attack, taking place in our not-too-distant past, 2017, is one of the most devastating ransomware attacks to date. Spreading to over 200,000 computers, the ransomware wreaked havoc on any system it could, including those at FedEx, Honda, and Nissan. But it didn’t stop there. It attacked universities, hospitals, and telecommunication services.&#160;
A Cryptoworm
What set WannaCry apart from its predecessors was that this time the cybercriminals weren’t demanding wire transfers ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/lxwpotuy/wannacryarticle.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>How much do you know about Stuxnet?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/how-much-do-you-know-about-stuxnet/                </link>
                <pubDate>Tue, 03 Sep 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/how-much-do-you-know-about-stuxnet/</guid>
                <description><![CDATA[The Stuxnet Worm was discovered in June of 2010 by Sergey Ulasen, an employee of VirusBlokAda, a small antivirus company. At first it was mistaken as an arbitrary Windows bug, just a conflict between the installed application. Which was why the report had been handed to such a small, local group. As it turns out, the worm was groundbreaking for a variety of reasons. Not only was this the first instance of malware that could take control of programmable industrial control systems, but it became s...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/vtbc4szi/gemini_generated_image_jl0s8zjl0s8zjl0s.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Eagle Eye: AI and Its Ethical Concerns</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/eagle-eye-ai-and-its-ethical-concerns/                </link>
                <pubDate>Fri, 30 Aug 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/eagle-eye-ai-and-its-ethical-concerns/</guid>
                <description><![CDATA[Eagle Eye&#160;
Eagle Eye, released in 2008, is an action-packed techno-thriller that left audiences clutching their popcorn with anticipation- not because the film was mysterious or nuanced, but because the action was relentless. It features a seemingly never-ending stream of car chases, fiery explosions, and dramatic moments. The film plunges viewers into a world where advanced technology becomes a tool of manipulation and control. While in 2008, AI wasn’t as readily available to the public as it i...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/meofgoi5/eagleeyeimage.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Hackers of the 2000s</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/hackers-of-the-2000s/                </link>
                <pubDate>Tue, 27 Aug 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/hackers-of-the-2000s/</guid>
                <description><![CDATA[If you thought the ‘90s were packed with cybercrime, the next decade brought an even greater wave of cyber threats. The rapid evolution of the internet introduced a multitude of unprecedented challenges that shaped the digital landscape forever. Starting off with a bang, the ILOVEYOU worm affected around 45 million users in May of 2000. Only a couple of months prior was the biggest denial of service attack to date, that took down Yahoo!, Fifa.com, Amazon, eBay, CNN, E*Trade, and Dell. Even more ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/fxsltcfn/hackersofthe2000simage.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Enemy of Realistic Surveillance Depictions </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/enemy-of-realistic-surveillance-depictions/                </link>
                <pubDate>Fri, 23 Aug 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/enemy-of-realistic-surveillance-depictions/</guid>
                <description><![CDATA[Enemy of the State, a widely popular political action thriller starring Will Smith is much more than just a gripping nail-biter, it was a look into the realities of modern-day surveillance techniques and their relation to the ever-growing digital landscape. The pervasive power of surveillance was constantly on the minds of audiences in 1998 with the traction of internet profiles and communication platforms. While the movie did well at the time of its release, its relevance truly peeked only a fe...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/vyopddfd/enemy-of-the-state-blog-image.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>The ILOVEYOU Worm, A Global Crisis</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/the-iloveyou-worm-a-global-crisis/                </link>
                <pubDate>Tue, 20 Aug 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/the-iloveyou-worm-a-global-crisis/</guid>
                <description><![CDATA[The ILOVEYOU worm is known as one of the farthest reaching occurrences of malware to date, having affected around 45 million users in only 10 days. The worm caused around $10 billion in damages, and it was estimated that 10% of Internet-connected computers had in some way been disrupted by the worm. It appeared in 2000, originating from a message generated in the Philippines. As it began to spread it didn’t stay contained to just personal devices, the worm managed to take down the services of Fo...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/ampim515/iloveyouwormheroimage.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Cyber Unrealism: The Net</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/cyber-unrealism-the-net/                </link>
                <pubDate>Fri, 16 Aug 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/cyber-unrealism-the-net/</guid>
                <description><![CDATA[The Net 1995
The 1995 film, The Net, starring Sandra Bullock was one of Hollywood&#39;s first attempts at an action-packed cyber thriller. It follows the main character Angela Bennett as she goes on a mission to bring down a corrupt Secretary of Defense&#160;and win back her identity. Bennett’s life is stripped away all for the success of a security program that most of the world uses which is actually responsible for several recent massive computer failures.&#160;

&#160;
Wiping Viruses&#160;
In the opening scene, the...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/0iblhmlx/thenetheroimage.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Hackers of the &#39;90s</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/hackers-of-the-90s/                </link>
                <pubDate>Tue, 13 Aug 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/hackers-of-the-90s/</guid>
                <description><![CDATA[In 1990, the turn of the decade saw a massive uptick in the number of computer hackers as the internet evolved into the tool we know it as today. While the World Wide Web didn’t become available to the public until 1993, that didn’t stop cybercriminals from taking advantage of the multitude of vulnerabilities that existed in earlier computer networks and systems. Two of these criminals went by the alias Datastream Cowboy and Kuji.&#160;
Datastream and Kuji&#160;
Really named Richard Price and Mathew Bevan...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/n5ohc0kt/gemini_generated_image_yewkmayewkmayewk.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>The Beekeeper, Keeping it Unrealistic </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/the-beekeeper-keeping-it-unrealistic/                </link>
                <pubDate>Fri, 09 Aug 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/the-beekeeper-keeping-it-unrealistic/</guid>
                <description><![CDATA[The Beekeeper, released in January of this year, is an action suspense thriller that stars Jason Statham with a premise around cyber scams. We follow him through a campaign of vengeance as he tries to avenge the death of a mother-like figure in his life. &#160;
The film starts off with the Beekeeper or Adam Clay grieving the death of a beloved women Mrs. Parker, who he rented barn space from. Mrs. Parker was a retired woman who lived on a remote farm in Maine and rented out her barn for some extra mo...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/jzffkoxx/beekeeper-poster-image.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Porches and Pacific Bell Dumpsters</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/porches-and-pacific-bell-dumpsters/                </link>
                <pubDate>Tue, 06 Aug 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/porches-and-pacific-bell-dumpsters/</guid>
                <description><![CDATA[In 1990 in Los Angeles, California, Michael B. Peters won a Porsche from the Los Angeles radio station KIIS-FM. Well...not really.&#160;&#160;
Kevin Poulsen is a well-known hacker who took over all the telephone lines for the radio station on June 1st, 1990. The station had a contest set for that day, when Prince’s “Kiss” started playing, the 102nd caller would win a Porsche 944 S2. Poulsen was only 25 when he tapped into these phone lines and blocked every call but his own, ensuring he would be caller #1...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/pk2jlnxv/kevinpoulsenimage.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Hackers, a &#39;90s Cautionary Tale</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/hackers-a-90s-cautionary-tale/                </link>
                <pubDate>Fri, 02 Aug 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/hackers-a-90s-cautionary-tale/</guid>
                <description><![CDATA[Hackers, released in 1995, showcased ridiculous visuals and at times an equally ridiculous portrayal of hackers. It is chalked full of ‘90s cyberpunk flair. If this movie could be summed up in one word, it would have to be camp. At the time Hackers was categorized as science fiction but now a days it seems more science than fiction. While the hairstyles, clothing, and slag might be absurd, some of the hacks are pretty realistic. To see how well this movie holds up, we can go scene by scene to se...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/edxcjwcf/hackerposternotblurry.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Viruses of the 80s</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/viruses-of-the-80s/                </link>
                <pubDate>Tue, 30 Jul 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/viruses-of-the-80s/</guid>
                <description><![CDATA[As we discussed in a recent blog post, Creeper is known as the first computer virus. However, the first malicious virus was actually created by a 15-year-old high school student named Rich Skrenta. He wrote what is now known as the Elk Cloner virus, a self-spreading personal computer virus that infected Apple II computers in 1982. This virus, unlike the Creeper, did not originate in a controlled environment. It spread via floppy disks by inserting itself into the computer’s memory once the compu...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/yu2cmcxe/blog80scomputer.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>The Matrix, Far From Reality?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/the-matrix-far-from-reality/                </link>
                <pubDate>Fri, 26 Jul 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/the-matrix-far-from-reality/</guid>
                <description><![CDATA[The 1999 film The Matrix was a revisionary movie in plot, special effects, and references to modern technology. It fascinated audiences with action, drama, and high stakes all while keeping to a cyberpunk/dystopian industrial aesthetic full of black leather and greasy hair. The sci-fi flick follows Neo, a hacker who is recruited by a group of renegades to break the human race free from an alternate reality program called the Matrix. It chronicles his journey from the time he takes ‘the red pill’...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/t5gfyteo/thematrixposter.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Do you know what the Morris worm is?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/do-you-know-what-the-morris-worm-is/                </link>
                <pubDate>Tue, 23 Jul 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/do-you-know-what-the-morris-worm-is/</guid>
                <description><![CDATA[In 1988 there was only a meager 60,000 computers connected to the internet. But this low number of the late 80s may have been for the best. On November 2nd, 1988, the Morris worm began to wreak havoc on around 6,000 of those 60,000 computers, each of which had been connected to ARPANET, the precursor of the internet. These 6,000 had been running Berkeley Unix, a specific operating system, and were all infected within 24 hours.&#160;&#160;
The worm was developed by Robert Tappan Morris, not to be confused ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/0w4ataw2/blogpostmorrisworm.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>War Games and Grim Warnings </title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/war-games-and-grim-warnings/                </link>
                <pubDate>Fri, 19 Jul 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/war-games-and-grim-warnings/</guid>
                <description><![CDATA[The film War Games, released in 1983, captivated audiences with a thrilling depiction of military super computers and the possibility of nuclear war. Hidden within the story of a young boy with a knack for technology is an accurate depiction of computerized, unmanned warfare. War Games illustrates a truly terrifying concept that one day we won’t be able to stop the technology that we created. While a rewatch of the film today really highlights the 80s cheese, at the time the film was a raging su...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/zamn55p4/wargamesarticleimage.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Kevin Mitnick, sound familiar?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/kevin-mitnick-sound-familiar/                </link>
                <pubDate>Tue, 16 Jul 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/kevin-mitnick-sound-familiar/</guid>
                <description><![CDATA[Kevin Mitnick is known as one of the world’s first cybercriminals, but before his infamous hacking career, he got his start in social engineering at only twelve years old. Living in Los Angeles, Mitnick used the bus system to get from place to place. Instead of paying for it, he used social engineering to bypass the punch card system used by the buses. He simply bought his own ticket punch, by recommendation from a driver, and used unused transfer slips from the garbage to ride any bus in LA.&#160;
H...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/geqplpxx/kevinmitnickblog-2.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Sneakers, a 90s Cyber Success</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/sneakers-a-90s-cyber-success/                </link>
                <pubDate>Fri, 12 Jul 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/sneakers-a-90s-cyber-success/</guid>
                <description><![CDATA[Here at cyberTAP we value real world applications, and as cyber professionals, we understand the practical nuances of our industry and how it applies to everyday life. However, the same can’t always be said for Hollywood executives. Their portrayals are often simultaneously over dramatized and over simplified. For the next few months, we’ll look at the best (and worst) depictions of cybersecurity in movies and TV.&#160;
Let’s start on a positive note with the 1992 film Sneakers. This quintessential 9...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/wm0loefw/sneakersheroimagemovieblog.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>How much do you know about the history of cybersecurity?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/how-much-do-you-know-about-the-history-of-cybersecurity/                </link>
                <pubDate>Tue, 09 Jul 2024 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Hope Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/how-much-do-you-know-about-the-history-of-cybersecurity/</guid>
                <description><![CDATA[Welcome to our deep dive into the history of cybersecurity! Join us as we uncover the development of our field through the decades by looking into some of the most notorious hacks and cybercriminals. The future of cybersecurity is full of innovation and crucial advancements. So, let’s take a look into the past. &#160;
To achieve the fullest picture of cybersecurity’s history, let&#39;s start from the very beginning. Technically, the first “cyberattack” took place in 1834 in France. Two brothers stole inf...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/2zgkiwdq/70scomputerblogimage.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>OK, I know what Zero Trust means. Now what?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/ok-i-know-what-zero-trust-means-now-what/                </link>
                <pubDate>Wed, 13 Apr 2022 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Matthew Crain]]></dc:creator>
                    <category><![CDATA[Cybersecurity Zero Trust]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/ok-i-know-what-zero-trust-means-now-what/</guid>
                <description><![CDATA[In the previous article, I spent some time unpacking NIST’s seven tenets of zero trust. However, those ideas only describe what zero trust intends to accomplish, and that leaves many questions unanswered. What does zero trust actually look like to implement? What are the technologies involved to meet the needs described in the tenets? How does one figure out what it all will cost?
I will never say that you can buy security, but you can buy a relationship with someone who may be more capable of b...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/ymviut2i/zero_trust_01.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Let&#39;s talk about NIST</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/let-s-talk-about-nist/                </link>
                <pubDate>Wed, 06 Apr 2022 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Training]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/let-s-talk-about-nist/</guid>
                <description><![CDATA[Since the creation of the TCP/IP protocol in 1983, that created the building blocks of the internet we know and love today, the technological world that we live in is rapidly evolving. Every innovation that advances the internet and its beneficiaries also creates new issues for cybersecurity to solve. These issues can lead to the theft of our PII (Personally Identifiable Information) and the theft of the government and our leading companies’ information. In order to combat this, the United State...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/fwjezmql/nist.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Amazon Patents Smell and Skin Texture as Biometrics</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/amazon-patents-smell-and-skin-texture-as-biometrics/                </link>
                <pubDate>Tue, 29 Mar 2022 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Chuck Garwood]]></dc:creator>
                    <category><![CDATA[Cybersecurity IoT Security]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/amazon-patents-smell-and-skin-texture-as-biometrics/</guid>
                <description><![CDATA[Amazon was recently awarded several patents for using biometrics such as smell and skin texture to identify people. Amazon’s Ring cameras have been a bit of an outlier lately as they don’t offer any sort of facial recognition, while the competing Google Nest cameras do. With these new patents, it appears Amazon may be looking to roll out something far more sophisticated than “simple” facial recognition, though Amazon claims that patents don’t necessarily reflect products or services that are in ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/cg3mdfeq/biometrics.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Log4j Rehashed</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/log4j-rehashed/                </link>
                <pubDate>Tue, 22 Mar 2022 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[George Bailey]]></dc:creator>
                    <category><![CDATA[Cybersecurity Attacks/Breaches]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/log4j-rehashed/</guid>
                <description><![CDATA[It was December 10, 2021, when the cybersecurity community was ablaze with hunting down yet another critical vulnerability. I know it&#39;s hard to keep vulnerabilities straight when they are discovered oh so often. I hope to use this blog entry to get cyberTAP readers up to speed with the current situation regarding the Apache Log4J security vulnerability. Let&#39;s start at the basics.
Log4j is the Java logging library developed and maintained by the Apache Software Foundation. This library is used in...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/tb0eziqm/log4jattack.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Purdue Cybersecurity Apprenticeship Program is Ready to Enroll</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/purdue-cybersecurity-apprenticeship-program-is-ready-to-enroll/                </link>
                <pubDate>Wed, 09 Mar 2022 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[James Stratton]]></dc:creator>
                    <category><![CDATA[Cybersecurity cyberTAP news]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/purdue-cybersecurity-apprenticeship-program-is-ready-to-enroll/</guid>
                <description><![CDATA[Does your company need to upskill your cyber-team? Are you an individual working in a cyber role and want to become a cyber-apprentice? Are you a US citizen? Then get in here and let’s have a chat about how we can make you a Purdue Cyber Apprentice.&#160;&#160;&#160;
We are very excited to announce that cyberTAP has recently adopted the Purdue Cyber Apprenticeship Program (PCAP), and are ready to enroll apprentices today!&#160; The Cyber Apprenticeship Program is part of a larger grant distribution from the US Depa...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/a4bbvi0u/cyber-security-students.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Identity Broker: How Does it Fit in the Identity Management Puzzle</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/identity-broker-how-does-it-fit-in-the-identity-management-puzzle/                </link>
                <pubDate>Fri, 25 Feb 2022 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Mike Johnson]]></dc:creator>
                    <category><![CDATA[Cybersecurity Operations]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/identity-broker-how-does-it-fit-in-the-identity-management-puzzle/</guid>
                <description><![CDATA[Recently for a project, the need arose to seamlessly, or as seamless as possible, connect two disparate Learning Management Systems so that users from one system can access content from another without re-entering credentials. Each system is administered and managed by different organizations.
How the heck are we going to do this with technical, security, and bureaucratic constraints looming on the horizon?
It turns out bureaucracy can be satisfied by filling out a lot of paperwork, accepting mo...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/bc3hcu45/puzzle.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>What it SIEMs vs. What it is: Exploring the Commonalities and Differences between SIEM, MSSP, and MDR.</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/what-it-siems-vs-what-it-is-exploring-the-commonalities-and-differences-between-siem-mssp-and-mdr/                </link>
                <pubDate>Tue, 15 Feb 2022 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Operations]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/what-it-siems-vs-what-it-is-exploring-the-commonalities-and-differences-between-siem-mssp-and-mdr/</guid>
                <description><![CDATA[Adopting a new technology in the workplace can lead to major changes in policies and/or procedures. Adopting a new security technology is no different; no matter your choice, there will be benefits and downsides. And while the title might have been a punny stretch, I hope it led you to realize that this article is here to explore SIEMs, MSSPs, and MDRs so you can make your next security technology adoption an informed decision.
First, it would behoove us to have an equal understanding of what SI...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/cm3kwqgp/siem_comp.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Intro to Zero Trust</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/intro-to-zero-trust/                </link>
                <pubDate>Thu, 27 Jan 2022 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Matthew Crain]]></dc:creator>
                    <category><![CDATA[Cybersecurity Zero Trust]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/intro-to-zero-trust/</guid>
                <description><![CDATA[This is the first in a planned series of articles about the concept of zero trust. It is a big subject; today, we will start small, and focus on getting the most basic understanding of just what zero trust is and what it means for an organization.
The first thing to do is talk about what isn’t changing when we move to zero trust. The logical model has always been to place a checkpoint between where you are and where you want to go. All information security can be viewed in this light: account cr...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/ymviut2i/zero_trust_01.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Salesforce Says, &quot;Yes,&quot; To MFA</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/salesforce-says-yes-to-mfa/                </link>
                <pubDate>Tue, 11 Jan 2022 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Application Security]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/salesforce-says-yes-to-mfa/</guid>
                <description><![CDATA[&quot;You know how we tell the good guys from the bad guys? The bad guys shoot at us.&quot; Rick Yancey learned this from his father, a concept that can be applied to the cyber world. The &quot;bad guys&quot; are finding increasingly creative ways of compromising the security of the world&#39;s data containers. Salesforce is a major player in the CRM world these days, where each Salesforce organization is a data container. Major players become primary targets, so let&#39;s look at some things Salesforce is doing to help pr...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/zvvhajaw/salesforce_mfa.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Tor, What Is It Good For</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/tor-what-is-it-good-for/                </link>
                <pubDate>Wed, 05 Jan 2022 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Krassimir Tzvetanov]]></dc:creator>
                    <category><![CDATA[Cybersecurity Operations]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/tor-what-is-it-good-for/</guid>
                <description><![CDATA[In early December, Radio Free Europe reported that Russia blocked the Tor service. Is that an effort to fight online crime and illegal content, or is there something deeper? Spoiler alert - I won&#39;t give you a conspiratorial answer, but instead, I&#39;ll give you more information so that you can make your conclusion. This blog post will explain what Tor is and how it works. The blog post is divided into three sections - one covering Tor and its use, another focusing on the technical implementation an...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/4bnbktc5/tor_browser.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Cyber Predictions For 2022: What&#39;s Coming Next Year</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/cyber-predictions-for-2022-whats-coming-next-year/                </link>
                <pubDate>Tue, 14 Dec 2021 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Eric Engle]]></dc:creator>
                    <category><![CDATA[cyberTAP News]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/cyber-predictions-for-2022-whats-coming-next-year/</guid>
                <description><![CDATA[It&#39;s December, so you know what that means; it&#39;s prediction season! It&#39;s the particular time of year when everyone gives their opinion on what will happen next year in cyber. We, of course, are no exception. We predict the next year will hold more phishing, more impactful ransomware, more organizations using cloud services, and more breaches.
Phishing will continue to be the most significant attack vector.
Nearly 75% of all organizations reported experiencing a type of phishing attack in 2020, a...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/oiyp3qls/cyber_predictions.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>What&#39;s Your Stripper Name? Social Engineering Through Viral Media</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/whats-your-stripper-name-social-engineering-through-viral-media/                </link>
                <pubDate>Tue, 07 Dec 2021 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Training]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/whats-your-stripper-name-social-engineering-through-viral-media/</guid>
                <description><![CDATA[Around the time Eminem started asking if he could have our attention, another trend was taking off across the world in the form of Social Media. The rise of social media brought with it a new technique for malicious actors to collect information about more people than they would have considered in the past: Viral Media. Viral media is digital content that is passed quickly and easily between multiple parties. While Marshal Mathers may have been the real Slim Shady and taken off on the music char...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/yf2atbbj/social-media.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Everyday Habits That&#39;ll Increase Your Cybersecurity</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/everyday-habits-thatll-increase-your-cybersecurity/                </link>
                <pubDate>Tue, 30 Nov 2021 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Training]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/everyday-habits-thatll-increase-your-cybersecurity/</guid>
                <description><![CDATA[Before coming to cybersecurity, many professionals have different ideas and practices than are required to preserve the security of information. These practices often include: clicking on links in email, opening a door for the person rushing in behind you, or leaving a computer unlocked when only being absent a couple of minutes. While each of these things may seem like harmless acts, a cybersecurity mindset would not allow these things, and there are good reasons for this.
Let’s take a look at ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/ercdtqme/cyber_thinking.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>New cybersecurity law providing support for K12</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/new-cybersecurity-law-providing-support-for-k12/                </link>
                <pubDate>Tue, 23 Nov 2021 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Joe Beckman]]></dc:creator>
                    <category><![CDATA[Cybersecurity K-12 Security]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/new-cybersecurity-law-providing-support-for-k12/</guid>
                <description><![CDATA[Distinguished as one of the few pieces of legislation to be signed by the President of the United States in the past decade, Public Law 117-47, known as the K-12 Cybersecurity Act, requires the federal Cybersecurity and Infrastructure Agency (CISA) to study the cybersecurity threat landscape facing U.S K-12 institutions. After studying the K-12 threat landscape, CISA must produce voluntary cybersecurity guidelines for K-12s and provide a “toolkit” ii built to assist schools and districts in stre...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/zfpgszkc/k-12-cybersecurityact.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>CMMC v2.0 Launched...Well, Sort Of</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/cmmc-v2-0/                </link>
                <pubDate>Tue, 16 Nov 2021 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[George Bailey]]></dc:creator>
                    <category><![CDATA[Cybersecurity Assessments]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/cmmc-v2-0/</guid>
                <description><![CDATA[As many readers of the cyberTAP blog already know, suppliers of goods and services to the United States Department of Defense (DoD) have been put on notice to improve their cybersecurity postures. This process started in November 2017 when the Defense Federal Acquisition Regulation Supplement 252.204-7012, commonly referred to as DFARS 7012 was released. DFARS are formal regulations regarding how business is conducted with the DoD. DFARS 7012 called for government contractors in the Defense Indu...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/j5al11s5/cmmc_v2.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>The Passwordless Future</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/the-passwordless-future/                </link>
                <pubDate>Tue, 09 Nov 2021 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Micah Snabl]]></dc:creator>
                    <category><![CDATA[Cybersecurity Application Security]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/the-passwordless-future/</guid>
                <description><![CDATA[For a long time in the world of computers, &quot;security&quot; has nigh been synonymous with &quot;passwords&quot;. &quot;Make complex passwords.&quot; &quot;Don&#39;t share your passwords.&quot; &quot;A member of our staff will never ask you for your password.&quot; These phrases, or those like them, have been repeated so often as to become second nature for many. Despite their pervasive usage, however, passwords represent one of the weakest links in the overall security landscape. In our attempts to enhance both security and usability, options o...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/sxkjsglo/passwordless_login.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Ransomware in Critical Infrastructure, and What You Should Already Be Doing</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/ransomware-in-critical-infrastructure-and-what-you-should-already-be-doing/                </link>
                <pubDate>Tue, 02 Nov 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Matthew Crain]]></dc:creator>
                    <category><![CDATA[Cybersecurity Attacks/Breaches]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/ransomware-in-critical-infrastructure-and-what-you-should-already-be-doing/</guid>
                <description><![CDATA[Ransomware attacks show no sign of slowing down anytime soon. In late September, one after another, two large ransomware attacks targeting the agriculture industry came to light. The ransomware group BlackMatter targeted NEW Cooperative, an Iowa software company that provides agricultural scheduling services. An unknown attacker compromised Crystal Valley Cooperative, a farm supplier and grain marketer in Minnesota.
There are a few important details that are becoming common to all ransomware att...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/p0sf4heg/ransomware_skull.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Where is the privacy with wearable technology?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/where-is-the-privacy-with-wearable-technology/                </link>
                <pubDate>Tue, 02 Nov 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Scott Richards]]></dc:creator>
                    <category><![CDATA[Cybersecurity IoT Security]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/where-is-the-privacy-with-wearable-technology/</guid>
                <description><![CDATA[So, when I decided to write about privacy with modern technology, I found an interesting thing occurred. I was convinced that the privacy concerns would break down over age groups. I started researching articles on technology privacy concerns, and much to my surprise, there was very little difference between age groups on privacy. Young or old, everyone fell into the &quot;privacy is paramount&quot; group. Jay Stanley wrote a terrific article covering this misperception that privacy is not a concern for t...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/dzkntrls/ray-ban-stories-facebook-ar-scaled.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Purdue@WestGate hosting Cybersecurity Demo Day in partnership with Purdue cyberTAP and Purdue MEP</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/purdue-westgate-hosting-cybersecurity-demo-day-in-partnership-with-purdue-cybertap-and-purdue-mep/                </link>
                <pubDate>Mon, 25 Oct 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[cyberTAP News]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/purdue-westgate-hosting-cybersecurity-demo-day-in-partnership-with-purdue-cybertap-and-purdue-mep/</guid>
                <description><![CDATA[Tuesday, October 26th, Purdue@WestGate is hosting an all-day, in-person networking event for students, small-business owners, or anyone interested in pursuing a cybersecurity career to network and gain hands-on experience. Features include industry and academic experts, panel discussions, and demos. Stop by for a chance to see cyberTAP&#39;s George Bailey and Mat Trampski participate in demos and panel discussions about Cyber Education and Business.
&quot;U.S. Businesses of all sizes experienced over 1,0...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/xbjoslcw/https___cdn-evbuc-com_images_145790463_240540686242_1_original.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Open Source in Application Development: Safe or Total Thermal Nuclear War?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/open-source-in-application-development-safe-or-total-thermal-nuclear-war/                </link>
                <pubDate>Tue, 19 Oct 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Mike Johnson]]></dc:creator>
                    <category><![CDATA[Cybersecurity Application Security]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/open-source-in-application-development-safe-or-total-thermal-nuclear-war/</guid>
                <description><![CDATA[Are open-source software tools safe to use in application development?
Probably...Sometimes...It Depends.
Truthfully, it is challenging for a general consumer to know if a developer has knowingly or unknowingly introduced a vulnerability in a piece of software that you are looking to implement into your organization. The same holds for an application developer who is contemplating integrating third-party code into their product.
Most open-source software is made up of other third-party component...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/b5qaorav/opensourcedevelopment.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Cybersecurity Awareness Month: Secure Your Phishing Defenses</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/cybersecurity-awareness-month-secure-your-phishing-defenses/                </link>
                <pubDate>Tue, 12 Oct 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/cybersecurity-awareness-month-secure-your-phishing-defenses/</guid>
                <description><![CDATA[From ransomware to SolarWinds, the cybersecurity space has been as hectic as it has ever been over the last 12-24 months. However, for all of the emerging threats and news that are cropping up on the horizon, phishing -- one of the oldest pain points in cybersecurity -- continues to quietly wreak havoc, and is as big of a threat as it has ever been.
Despite often being overlooked in terms of hype, phishing has been a mainstay in the cybersecurity threat landscape for decades. In fact,&#160;43 percent...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/nc4pmgfz/phishing_attempt.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Cybersecurity Awareness Month: Get Familiar with the Cyber Basics</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/cybersecurity-awareness-month-get-familiar-with-the-cyber-basics/                </link>
                <pubDate>Tue, 05 Oct 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Cybersecurity Awareness]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/cybersecurity-awareness-month-get-familiar-with-the-cyber-basics/</guid>
                <description><![CDATA[At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks and breaches, including the SolarWinds and Kaseya breaches as well as high-profile attacks on the Colonial Pipeline and other critical infrastructure. Furthermore, as has been underlined by these recent breaches, cyberattacks are becoming more sophisticated with more evolved bad actors cropping up each day. Luckily, there are several steps ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/lnpldqnm/istock-1271635549.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Year in Review - Message from the Director</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/year-in-review-message-from-the-director/                </link>
                <pubDate>Tue, 28 Sep 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Mat Trampski]]></dc:creator>
                    <category><![CDATA[cyberTAP News]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/year-in-review-message-from-the-director/</guid>
                <description><![CDATA[Hello again everyone! Thanks for giving cyberTAP your attention; we very much appreciate our partners, clients, and friends. Without you we’d be really bored, not to mention, without you we couldn’t achieve all of the great things we’ve done over the past few years. As our fiscal year closed over this summer, we retrospectively looked at our accomplishments to see if we executed the strategy our leadership team set forth. Well, cyberTAP set out to do big things in FY21 and boy did we. Our strate...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/timgqphu/classroom_bg.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Knock! Knock! Your Package Has Arrived: Amazon&#39;s New In-Garage Delivery Service</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/knock-knock-your-package-has-arrived/                </link>
                <pubDate>Tue, 21 Sep 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Chuck Garwood]]></dc:creator>
                    <category><![CDATA[Cybersecurity IoT Security]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/knock-knock-your-package-has-arrived/</guid>
                <description><![CDATA[Amazon recently announced a new delivery service, where they will deliver packages directly into your garage. No more worrying about porch pirates stealing your Amazon Prime Glitter Bombs off your porch while you’re at work. It seems like a great idea on the surface.&#160;
However, this means connecting your garage door to the&#160;internet&#160;and adding an optional&#160;cloud-based camera to&#160;your garage.&#160;
From Amazon’s announcement, it appears&#160;they’ve put some thought into security. The delivery driver can only ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/as4dz3db/istock-1289048956.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>In Ransomware, the Kids Aren’t All right.  The Taxpayers aren’t Either.</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/in-ransomware-the-kids-aren-t-all-right-the-taxpayers-aren-t-either/                </link>
                <pubDate>Sat, 04 Sep 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Joe Beckman]]></dc:creator>
                    <category><![CDATA[Cybersecurity Attacks/Breaches]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/in-ransomware-the-kids-aren-t-all-right-the-taxpayers-aren-t-either/</guid>
                <description><![CDATA[According to their website, the Judson Independent School District in Texas discovered on June 17, 2021, that it was victimized by ransomware.&#160; The attack made unavailable the district’s critical systems including telephone and e-mail services.&#160; A district call center was set up to coordinate summer school, among other activities, and e-mail communications from the district using newly created Gmail accounts were met with skepticism from parents.&#160; To end the chaos and restore its critical system...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/sgalx41h/national-cancer-institute-n_aihp118p8-unsplash.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Not just a matter of Gbps - Classifying DDoS Attacks</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/not-just-a-matter-of-gbps-classifying-ddos-attacks/                </link>
                <pubDate>Tue, 10 Aug 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Krassimir Tzvetanov]]></dc:creator>
                    <category><![CDATA[Cybersecurity Attacks/Breaches]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/not-just-a-matter-of-gbps-classifying-ddos-attacks/</guid>
                <description><![CDATA[Distributed Denial of Service&#160;(DDoS)&#160;attacks are becoming prevalent in our daily life. Just in the past&#160;ten&#160;years,&#160;things have changed significantly – from the forgotten&#160;hacktivist collective Anonymous&#160;through&#160;booters, to present-day organized crime using DDoS as leverage for extortion.&#160;Just like boiling the proverbial frog,&#160;this topic&#160;crept&#160;up on all of us,&#160;and there is&#160;much&#160;misunderstanding resulting from partial reporting and not&#160;a&#160;clear understanding of the topic as a whole.&#160;While most peopl...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/vt1ns0kk/ddos_attack.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>I Am Not a Cyber Expert - Odds Are, You Aren’t Either.</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/i-am-not-a-cyber-expert-odds-are-you-aren-t-either/                </link>
                <pubDate>Tue, 03 Aug 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Training]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/i-am-not-a-cyber-expert-odds-are-you-aren-t-either/</guid>
                <description><![CDATA[Three years ago, I thought I had everything figured out. Finish up school, land a job doing something in the field I studied in, raise a family, etc. Little did I know my path was going to change. Just a few months later, I ended up not only working but teaching in a field I knew little to nothing about: cybersecurity. Now, you might be thinking, ‘wow, this guy lucked into the right field at the right time,’ and I would say you are absolutely correct. Most of my friends thought I was a little bi...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/10ccnc0s/cyber_expert.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Cybersecurity Insurance - Another tool in your risk management strategy</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/cybersecurity-insurance-another-tool-in-your-risk-management-strategy/                </link>
                <pubDate>Tue, 27 Jul 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[George Bailey]]></dc:creator>
                    <category><![CDATA[Cybersecurity Operations]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/cybersecurity-insurance-another-tool-in-your-risk-management-strategy/</guid>
                <description><![CDATA[At the core of all cybersecurity policies, procedures, standards, guidelines, frameworks, technical controls, training, etc., is the idea of risk management.&#160; Managing the risk of a data breach to an acceptable level is no easy task.&#160; Generically speaking, risk management is the process of determining an acceptable level of risk, calculating the current level of risk, and then either accepting the level of risk or taking steps to reduce the acceptable level of risk via mitigation or transference...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/vsggylur/cyber_insurance.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Don&#39;t Threaten Me with a Good Time -- DPAs in Modern Business</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/don-t-threaten-me-with-a-good-time-dpas-in-modern-business/                </link>
                <pubDate>Wed, 07 Jul 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Operations]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/don-t-threaten-me-with-a-good-time-dpas-in-modern-business/</guid>
                <description><![CDATA[We were a little surprised recently when we received a DPA that included requirements to comply with regulations in Dubai and New Zealand. Dubai? Why a city and not a country? Heck, why not just Burj Khalifa? New Zealand? We know this partner does business in Australia, so why kiwis and not kangaroos? Shouldn’t the Eye of Sauron be enough?
So are these the strictest DPAs? If not, why add Dubai and New Zealand? Most importantly, what kind of penalties could I incur if I don’t comply?
Background o...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/uwyf4ffw/data_privacy.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Ransomware is a Scourge, But Also Helpful</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/ransomware-is-a-scourge-but-also-helpful/                </link>
                <pubDate>Tue, 29 Jun 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Matthew Crain]]></dc:creator>
                    <category><![CDATA[Cybersecurity Attacks/Breaches]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/ransomware-is-a-scourge-but-also-helpful/</guid>
                <description><![CDATA[Everything, everywhere, eventually comes down to money. Even non-profit health care organizations tend to operate as if they have investors peering over their shoulders, because each dollar represents some portion of a life they could save. Put in those terms, it is easy to see why organizations might be reluctant to spend a single dollar on something that doesn’t directly contribute to their mission, profit or otherwise.
Cybersecurity spending isn’t immune to that reluctance, and that isn’t sur...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/br0jgmru/ransomware_attack.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Training the Next Cybersecurity Professionals</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/training-the-next-cybersecurity-professionals/                </link>
                <pubDate>Wed, 23 Jun 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Training]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/training-the-next-cybersecurity-professionals/</guid>
                <description><![CDATA[Over the past 18 months, the world has transformed, and many professionals relocated to working in a remote setting. Unfortunately, the speed at which this transition took place, coupled with the necessity of working remotely, was a potent combination that escalated cybersecurity risk for almost all businesses. As a result, we have seen more news reports about new and existing vulnerabilities exploited in the wild.
This increase in cybersecurity risk coupled with an unprecedented need for skille...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/btth0n5y/arlington-research-nflmpaf9dvc-unsplash.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>The Colonial Pipeline Attack: A New Phase in Cyber Defense</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/the-colonial-pipeline-attack-a-new-phase-in-cyber-defense/                </link>
                <pubDate>Tue, 15 Jun 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Joe Beckman]]></dc:creator>
                    <category><![CDATA[Cybersecurity Attacks/Breaches]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/the-colonial-pipeline-attack-a-new-phase-in-cyber-defense/</guid>
                <description><![CDATA[Since the initial accusations of election interference in 2016, the steady stream of hacking incidents attributed to the Russian government has plagued US cybersecurity practitioners like chronic pain. But, the ransomware attack levied on Colonial Pipeline is not just a flare-up of the same old pain. Instead, the actors, techniques, and responses are all worthy of our attention because they may forbode changes in the cybersecurity landscape.
The “who” in our “who dun it?” are probably not organs...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/0kkfiw1e/hackerhands.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Stopping DDoS in its Tracks</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/stopping-ddos-in-its-tracks/                </link>
                <pubDate>Tue, 08 Jun 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Krassimir Tzvetanov]]></dc:creator>
                    <category><![CDATA[Cybersecurity Attacks/Breaches]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/stopping-ddos-in-its-tracks/</guid>
                <description><![CDATA[I often get asked, &quot;What’s the best equipment one can buy to protect my company from a Distributed Denial of Service (DDoS) attack?&quot; While this is a valid question it is making a very large number of assumptions – namely, that you have a very large volume of traffic and a very large budget. While, performing mitigation themselves is valid for some companies, this is rarely the case and, in this blog post, we are going to uncover the considerations you must make.
The asset
Before we start talking...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/vt1ns0kk/ddos_attack.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Message from the Director - June Update</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/message-from-the-director-june-update/                </link>
                <pubDate>Tue, 01 Jun 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Mat Trampski]]></dc:creator>
                    <category><![CDATA[cyberTAP News]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/message-from-the-director-june-update/</guid>
                <description><![CDATA[The very excellent Eric, with whom rests the primary responsibility of our blog and newsletter, has been badgering me for some time to provide a note from the director. He’s been patient and I’ve been procrastinating. I’m not procrastinating because I have nothing to say. Anyone that knows me well, knows I’m rarely at a loss of words, not of words. No, I’m procrastinating because I’m never quite sure what to say in these notes; humblebrags, kudos to high performers, comments about our favorite c...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/timgqphu/classroom_bg.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>The Critical Security Controls for Small to Medium Size Business.</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/the-critical-security-controls-for-small-to-medium-size-business/                </link>
                <pubDate>Tue, 18 May 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Nate Bradbury]]></dc:creator>
                    <category><![CDATA[Cybersecurity Operations]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/the-critical-security-controls-for-small-to-medium-size-business/</guid>
                <description><![CDATA[The Center for Internet Security (CIS) is a non-profit organization dedicated to developing guidelines and standards to help organizations and individuals alike protect themselves from internet threats. Their main claim to fame is the Critical Security Control (CSC) Top 20 list, which is a prioritized list of controls designed to help organizations build a security program in a step by step fashion that builds a strong security foundation and reduces the greatest amount of risk by following the ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/fbvdtfmh/istock-1180897630.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Don&#39;t Trust Users: Application Security Basics</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/don-t-trust-users/                </link>
                <pubDate>Tue, 11 May 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Micah Snabl]]></dc:creator>
                    <category><![CDATA[Cybersecurity Application Security]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/don-t-trust-users/</guid>
                <description><![CDATA[When it comes to application security, it pays to be a cynic. When developing a tool, it is quite easy to focus on all of the things it is supposed to accomplish. The converse is of similar importance: we need to think about the things it should not be able to do. An arbitrary user from the public internet should not be able to view our internal data. A standard user should not be able to modify administrator settings. A user should not be able to change the personal profile information of a dif...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/0iiietv1/hacker_man.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Phishing: Beware of those Sneaky, Slimy, Stinky Messages</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/phishing-beware-of-those-sneaky-slimy-stinky-messages/                </link>
                <pubDate>Tue, 04 May 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[George Bailey]]></dc:creator>
                    <category><![CDATA[Cybersecurity Attacks/Breaches]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/phishing-beware-of-those-sneaky-slimy-stinky-messages/</guid>
                <description><![CDATA[It’s 3 am, you are abruptly awoken from a deep sleep by a banging on your door.&#160; You wipe the sleep from your eyes and glare at your alarm clock, who could that be at this hour, you say to yourself.&#160; You’re not expecting any late-night visitors, your family is sound asleep in their beds, your mind races to the evening news.&#160; Your heart is pounding.&#160; Do you immediately jump out of bed and open the door?&#160; No?&#160; Why not?&#160; Too risky?&#160;
I propose that if we treated items delivered to our Internet mailb...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/4ppbehgn/phishing.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Securing Mr. Roboto: Cybersecurity in ICS Environments</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/securing-mr-roboto-cybersecurity-in-ics-environments/                </link>
                <pubDate>Tue, 27 Apr 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Joe Beckman]]></dc:creator>
                    <category><![CDATA[Cybersecurity Industral Security]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/securing-mr-roboto-cybersecurity-in-ics-environments/</guid>
                <description><![CDATA[The February 5, 2021 attack on the Oldsmar, Florida water supply brought the cybersecurity of industrial control systems (ICS) to the front of national attention in the United States. As is often the case with cyberattacks, the Oldsmar attack neither exploited a novel vulnerability nor did it expose a new risk to cybersecurity professionals. The attack did make more concrete for many Americans a type of cyberattack that may be difficult to understand or that may appear to be relegated to science...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/ulapsm4s/science-in-hd-pazsrqf3xuq.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>A Letter to Cybersecurity from an Application Developer</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/a-letter-to-cybersecurity-from-an-application-developer/                </link>
                <pubDate>Tue, 20 Apr 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Mike Johnson]]></dc:creator>
                    <category><![CDATA[Cybersecurity Application Security]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/a-letter-to-cybersecurity-from-an-application-developer/</guid>
                <description><![CDATA[Dear Cybersecurity,
I don&#39;t get you. I thought we were going to be good friends instead, you hang out with all my other friends. You&#39;ve changed, I don&#39;t recognize you anymore. I know we haven&#39;t always run in the same circles, but we&#39;ve always kept in touch.
I first got to know you when I started down the path of application development in college designing Access databases and simple HTML although it seemed like you spent more time with the hardware and networking students than us programmers. I...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/fsufnhgc/james-harrison-vpoexr5wmr4-unsplash.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>What is Cyber Threat Intelligence?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/what-is-cti/                </link>
                <pubDate>Tue, 13 Apr 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Threat Intelligence]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/what-is-cti/</guid>
                <description><![CDATA[Over the past 8-10 years, the term Cyber Threat Intelligence (CTI) permanently settled in our dictionary. But what is it? Apart from every term containing &quot;cyber&quot; is cool, it does not appear we have a clear definition for CTI as at times it appears to be everything InfoSec related under the sun, including the four-decade-old anti-virus products.
The first public CTI mention was around 2004, at 16th Annual FIRST Conference in Budapest, Hungary. When Ian Cook, brought up the following questions CT...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/qlaozeew/cyberthreatintel.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>What it Takes to Admin SaaS</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/what-it-takes-to-admin-saas/                </link>
                <pubDate>Tue, 06 Apr 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Operations]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/what-it-takes-to-admin-saas/</guid>
                <description><![CDATA[What&#160;does it take&#160;to administer a&#160;SaaS&#160;(Software&#160;as a&#160;Service)&#160;application? Well,&#160;here are some&#160;thoughts.&#160;First,&#160;you need&#160;to&#160;know&#160;what&#160;the software&#160;can do.&#160;I&#160;don&#39;t&#160;mean the stuff they put&#160;on&#160;the&#160;brochure.&#160;I&#39;m&#160;talking about&#160;the&#160;nitty-gritty&#160;details. This happens over time as&#160;you&#160;work with it, but a good&#160;SaaS app will&#160;have an&#160;abundance&#160;of resources and&#160;hopefully even a&#160;community&#160;of&#160;other users&#160;to reach out&#160;to&#160;that&#160;can&#160;help&#160;with&#160;the&#160;learning curve.&#160;Second, you need to&#160;become very aware&#160;of&#160;the&#160;needs...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/52wlbsu3/saas_post.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>What is CMMC?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/what-is-cmmc/                </link>
                <pubDate>Tue, 30 Mar 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[George Bailey]]></dc:creator>
                    <category><![CDATA[Cybersecurity Assessments]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/what-is-cmmc/</guid>
                <description><![CDATA[Wait, What, another cybersecurity standard to implement?!? Yes, amongst all the available choices from NIST, FIPS, ISO, COBIT, ISACA, PCI, and many others, a new standard has been developed. This one is slightly different than the others and is targeted towards organizations charged with protecting sensitive, albeit unclassified information, that is created, processed, transmitted, and accessed while providing goods and services to the US Department of Defense. This blog post will introduce the ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/4y1e2hxt/businessman-holding-virtual-interface-panel-of-global-logistics-and-picture-id1274428108.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Defense Lives Here: What a former B1G Ten Defensive Player of the Year can teach us about defensive cybersecurity?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/defense-lives-here/                </link>
                <pubDate>Tue, 16 Mar 2021 12:00:00 -04:00</pubDate>
                <dc:creator><![CDATA[Mat Trampski]]></dc:creator>
                    <category><![CDATA[Cybersecurity Training]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/defense-lives-here/</guid>
                <description><![CDATA[In 2015 Purdue University’s perimeter was secure. The necessary controls in place demonstrated to our most sophisticated adversaries that nothing would be “easy” from the outside. To match this secure perimeter, our interior defenses were equally strong. An elite level of perimeter and interior defense is a luxury not easily achieved. So how did Purdue do it? Was it the best technical and administrative controls? Was it a breakthrough by our world-class researchers? Did we deploy military grade ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/0i0fhveh/tan_digitalball-0-5x.png" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Moving a Workforce Out Of Office</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/moving-a-workforce-out-of-office/                </link>
                <pubDate>Tue, 09 Mar 2021 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Mike Johnson]]></dc:creator>
                    <category><![CDATA[Cybersecurity Operations]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/moving-a-workforce-out-of-office/</guid>
                <description><![CDATA[Raise your hand if the current pandemic climate has accelerated a change or outright shift in the way you do business. Keep your hand raised if you weren’t 100% prepared for this shift. For those that can’t see, my hand is firmly in the air as I expect many of yours are as well. Fortunately, our group was more in the “accelerated a change” group than the alternative. That change consisted of exiting the physical office, because quarantining didn’t give us much choice, and embracing the remote wo...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/as4dz3db/istock-1289048956.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Why Do I Need a Cybersecurity Risk Assessment?</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/why-do-i-need-a-cybersecurity-risk-assessment/                </link>
                <pubDate>Tue, 02 Mar 2021 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Matthew Crain]]></dc:creator>
                    <category><![CDATA[Cybersecurity Assessments]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/why-do-i-need-a-cybersecurity-risk-assessment/</guid>
                <description><![CDATA[Every cybersecurity program I’ve ever seen lists risk assessment as its first step, a foundation upon which all the other security measures will build. But with so many potential fires to fight, why is risk assessment the first place to start? What makes risk assessment such a foundational element to cybersecurity?
Let’s try to get at the answer from the other side. What would cybersecurity management look like if we skipped risk assessment entirely? To put it in more concrete terms, we’ll use t...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/g5ebdu1g/istock_000012421954xlarge.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Understanding the SolarWinds “Sunburst” Hack</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/understanding-the-solarwinds-sunburst-hack/                </link>
                <pubDate>Tue, 23 Feb 2021 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Joe Beckman]]></dc:creator>
                    <category><![CDATA[Cybersecurity Attacks/Breaches]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/understanding-the-solarwinds-sunburst-hack/</guid>
                <description><![CDATA[You could be forgiven if you rolled your eyes and clicked through to the next story when you first learned of the SolarWinds hack. Cybersecurity incidents have become commonplace events and if you weren’t running the SolarWinds Orion network monitoring platform, you were probably concerned with more direct security threats to your networks.&#160; But among the thousands of cybersecurity incidents reported each year, the SolarWinds “Sunburst” attack and its arc deserve your attention.
By the time that...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/0xpocdl2/range_scenarios_header.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Knowledge is Power</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/knowledge-is-power/                </link>
                <pubDate>Tue, 16 Feb 2021 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Staff Author]]></dc:creator>
                    <category><![CDATA[Cybersecurity Analytics]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/knowledge-is-power/</guid>
                <description><![CDATA[Picture if you will a special operative who has been given the directive of establishing communication between generals on the field of battle. These generals are from different countries and speak different languages, but their ultimate goal is the same – securing their own victories to help the allies as a whole to achieve the overall victory.&#160; The operative’s job is to make sure that each general is able to take what they see and make some key decisions about it over time for the improvement ...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/fagddoeu/cybertap_cybersecurity_training.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
            <item>
                <title>Welcome to the cyberTAP</title>
                <link>
https://cyber.tap.purdue.edu/blog/articles/welcome-to-the-cybertap/                </link>
                <pubDate>Tue, 09 Feb 2021 12:00:00 -05:00</pubDate>
                <dc:creator><![CDATA[Mat Trampski]]></dc:creator>
                    <category><![CDATA[cyberTAP News]]></category>
                <guid isPermaLink="false">https://cyber.tap.purdue.edu/blog/articles/welcome-to-the-cybertap/</guid>
                <description><![CDATA[I’m a lucky guy, what else can I say! Good health, good family, and a good job…
The world faces the shifting sands of an ever-changing cybersecurity landscape: new strains of ransomware popping up, the supply chains of our trusted partners under attack, and a growing number of connected surfaces (and services) to protect. Added to that chaos, now we must endure the tempest of a global pandemic. Through all these challenges I have enjoyed the privilege of working with a brilliant and dedicated te...]]></description>
                <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://cyber.tap.purdue.edu/media/timgqphu/classroom_bg.jpg" width="1024" height="512"><media:keywords>full</media:keywords></media:content>
            </item>
</channel>
</rss>