Jim Lerums and Katherine Reichart developed the Indiana Cybersecurity Scorecard, a tool for non-experts to confidently self-assess the state of their organization’s cyberinfrastructure.
High school students and teachers from across Indiana participated in “Cyber Encounters,” a day-long cybersecurity workshop, at Purdue University on November 6.
Ida Ngambeki, assistant professor of computer and information technology, is researching techniques to incorporate secure programming into computer programming curricula without adding to the course load.
During a visit to Purdue University, U.S. Secretary of Labor Alexander Acosta announced a $12 million award to Purdue’s Polytechnic Institute to develop a program to help fill a growing need for cybersecurity professionals.
The free Purdue University Cybersecurity Camp will return to Purdue’s West Lafayette campus June 9–14, 2019, for girls entering the ninth through 12th grades.
FileTSAR, an all-in-one cybersecurity toolkit developed by Purdue Polytechnic researchers and their colleagues, is helping detectives dust for digital fingerprints.
Purdue’s Department of Computer and Information Technology is well positioned to provide graduates ready for work in cybersecurity, a field poised to add 1.5 million jobs by 2020.
Courses in cybersecurity titled Certified Ethical Hacking and Certified Information Systems Security Professional will be the first CareerMakers certification opportunities offered by the Purdue Polytechnic Institute at Westgate @ Crane Technology Park.
Law enforcement agencies have been relying on forensics tools not well suited to today’s digital world. To provide a modern, cost-effective solution, a research team led by Kathryn Seigfried-Spellar, assistant professor of computer and information technology, is building File Toolkit for Selective Analysis & Reconstruction (File TSAR) for Large Scale Computer Networks.
Students working in the Department of Computer and Information Technology have discovered “Ring-Road,” a software bug which could make it easier for hackers to breach popular services like Google’s Gmail.