There are many career paths available for individuals with MSIS degrees outside of traditional IT, such as security architecture, crime investigation and systems analysis.
Here are three of the top high profile information security breaches in the 21st century, and what they tell us about our technological weaknesses.
Big Data has changed the very nature of the information security field. It raises questions about privacy at public, private, consumer, government & business levels.
As wireless networks and devices proliferate, so do wireless security threats and wireless vulnerabilities.
Three students in the MS in Information Security program participated in the Cyber 9/12 Student Challenge, a national competition that tests the ability to craft high-level policy recommendations for a major cyber threat.
On a cyber-level, companies are at risk each day for being hacked or subjected to malware. To effectively protect essential information, one of their most important assets, companies must find qualified individuals to protect and secure data. Read more
In many cases, the greatest cyber threats to companies originate inside their own system. Read more
New methods of data storage have been introduced in the past decade, and as the world of information technology moves forward, advanced security measures are being taken to ensure the protection of user identities and data. Read more
With an increase in technological advances, society increasingly becomes at risk for hackers or other forms of cyber-attacks. Read more