News

Girls-only cybersecurity event attracts hundreds to ASU West campus


November 20, 2019

Eighth grade student Debbie from Country Meadows Elementary School in Peoria dreams of becoming a computer programmer someday. But until this week, she had never met a woman in that role.


2019

November

Eighth grade student Debbie from Country Meadows Elementary School in Peoria dreams of becoming a computer programmer someday. But until this week, she had never met a woman in that role.

September

Each year more than 50,000 cybersecurity professionals from around the globe come together to attend the world’s preeminent cybersecurity gathering, RSA Con

The average cost of a single data breach is nearly $3.9 million. Globally, the cost of cybercrime is expected to top $2 trillion this year, according to Juniper Research.

August

Just as it’s increasingly common to find a smart home assistant on a countertop or an internet-connected camera at the front door, smart toys are also becoming ubiquitous in the playroom.

Consumers have increasingly become victims of telephone scams — including the recent proliferation of Social Security number suspension ploys — to gain access to their personal information.

North Korean hackers squeeze $2 billion out of cryptocurrency networks. Russian hackers breach networks using "internet of things" devices.

July

Eduardo Hinojosa has a passion for the field of artificial intelligence. But the 16-year-old was at a dead end trying to pursue his digital passion in his hometown of Redwood City, California.

June

Kim Jones is a former CSO who has built, operated, and managed information security programs within the financial services, defense, healthcare, manufacturing, and business outsourcing industries.

May

Maintaining software is costly, and for developers like Facebook and Microsoft, repairing software bugs can be very expensive.

Fake news. Weaponized narratives. Agitprop.

It’s all chatter, until someone puts down the keyboard, picks up a gun and walks into a house of worship.

How do you fight that?

The world’s top chess player isn’t a human or a computer, it’s a “centaur” — a hybrid chess-playing team composed of a human and a computer.

Last month, more than 50,000 cybersecurity professionals from around the globe converged on San Francisco to attend the world’s preeminent cybersecurity gathering, the 

April

Electrical engineering researchers are constantly improving the technologies that impact our everyday lives.

In August 1970, a woman named Patricia Ann Parker filed a paternity suit against Elvis Presley in Los Angeles Superior Court.

March

Law enforcement organizations across the United States have recently arrested

February

U.S. Director of National Intelligence Daniel Coats released the 2019 National Intelligence Strategy in late January.

January

Most of us think of cybersecurity and biology

Arizona State University Assistant Professor Tiffany Bao won best paper for her collaborative research on cyberwarfare at the NSA’s sixth annual

2018

October

In 1855, an English photographer named Roger Fenton traveled to Crimea to document the war there.

Cyberattacks make the headlines seemingly every week, with few untouched by the breaches. But there is positive news as researchers take aim at malicious hackers.

September

When flying to Beijing, you’ll likely have to take multiple flights and pass through customs to get to your destination.

July

Macy’s has announced a data breach involving thousands of Macys.com and Bloomingdales.com customer cred

May

If you have checked your email, visited a website or opened an app in the past few weeks, you've probably seen an updated privacy policy or terms of service agreement. What's going on? 

April

In 2013 Arizona State University researchers Paulo and Jana Shakarian collaborated on a book that explored cyberwarfare from “a human-centric viewpoint,” as Paulo Shakarian described it.

Military experts, strategists, academics and national security thought leaders will gather at an international conference Monday hosted by Arizona State University and D.C.-based think tank New Ame

March

In today’s fast-moving, high-tech world, we leave digital footprints nearly everywhere we go, our sensitive personal information is under attack from those who want to track our habits or steal our

More than 40,000 cybersecurity professionals will descend upon San Francisco's Moscone Center in mid-April for the annual RSA Conference, "Where the World Talks Security."

More than 40,000 cybersecurity professionals will descend upon San Francisco's Moscone Center in mid-April for the annual RSA Conference, "Where the World Talks Security."

Our current approach to cybersecurity is not working and it threatens our democracy, economy and critical infrastructure, according to ASU Biodesign Professor Stephanie Forrest, who spoke to a grou

Kim Jones, director of the Cybersecurity Education Consortium at Arizona State University's New College of Interdisciplinary Arts and Sciences, has been awarded the ASU Foundation's 2017–18 Women a

February

When Paul Black set out in early 2017 to start a summer internship program at McKesson he had high expectations.

ATM machines across the country are being targeted by a wave of criminals in search of an illegal high-tech payday. The Secret Service calls this phenomenon “jackpotting,” and are warning U.S.

January

For the first time in ten years, the U.S.

Alonzo Jones has one of the best jobs at Arizona State University: associate athletic director for inclusion and championship life.

Who doesn’t want to lead a championship life?

2017

December

Kim Jones, director of the Cybersecurity Education Consortium (CEC) and professor of practice at ASU’s West campus

Kim Jones, director of the Cybersecurity Education Consortium (CEC) and professor of practice at ASU’s West campus

November

At a cinema in the not-too-distant future …

The deputy defense minister sprints down a street in Vienna. His smart watch contains missile blueprints.

By 2022, the world may see a cybersecurity workforce gap of nearly 2 million jobs.

October

When people think of hackers, a picture of someone slumped over a computer in a dimly-lit room often comes to mind; but who knew hacking skills could be used for good?

September

Facebook and Google have recently come under fire for allowing advertisers to target ads towards users who express an interest in hate speech or racist sentiments.

The recent Equifax data breach is just one in a growing list of businesses experiencing cybersecurity failures

The recent Equifax data breach is just one in a growing list of businesses experiencing cybersecurity failures

Military veterans are disciplined, task-focused, team-oriented and get the job done.

These are the same traits required in the information technology field.

On Sept. 7, Equifax Inc. announced a breach of data impacting about 143 million U.S.

August

Cybersecurity is a slippery thing, hard to define, train for and fight against.

And it may be the biggest threat of the 21st century.

June

In “The Art of War,” famed Chinese general Sun Tzu advised, “if you know the enemy and know yourself, you need not fear the result of a hundred battles.”

2016

October

It has happened to nearly everyone: Someone hacked into your Facebook account, or your bank had to send you a new card because of fraud detection.

August

Editor's note: This story is being highlighted in ASU Now's year in review.