Monday, May 21, 2012
The ICDW is a virtual workshop for military information assurance specialists and computer science practitioners. Attendees will interact with instructors while participating in live, web-based workforce development activities including attack and defense exercise components and instructor-led training and briefings. The ICDW will be conducted over the Internet, will be unclassified and workshop exercises will be conducted in a secure and isolated information assurance range.
Visit the ICDW Portal at https://icdw.iaportal.navy.mil to set up a
registration account and take advantage of Additional Resources such as industry whitepapers, reports, blogs, podcasts, webcasts and links to events and instructional videos.
To register and more information, please contact Ms. Johanna Vazzana at firstname.lastname@example.org
Wednesday, May 16, 2012
A U.S. Senator's bill to broaden cybersecurity intelligence gathering is in trouble after other legislators question whether proposed protections comes at the expense of citizens' privacy.....
Friday, March 23, 2012
The University of Advancing Technology (UAT) is proud and honored to welcome Rear Admiral Sanders to our campus. RADM Sanders will address students, faculty and guests on the topic of 'Maritime Strategy' at 2:00 pm on Thursday, March 29th. RADM Sanders' visit is part of Navy Week, a program targeted at increasing the understanding of the American Navy, as well as, its mission and relevance to national security.
The outreach program is designed to facilitate participation in a myriad of events ranging from building houses with Habitat for Humanity, visiting sick children in the hospital in Caps for Kids, and in meeting with educational and community leaders. Through UAT's commitment to cyber defense and national security, RADM Sanders' visit to campus serves to reaffirm both this commitment and our existing partnerships and collaborations with the United States Armed Forces and respective government agencies (Department of Defense, Department of Homeland Security, Federal Bureau of Investigation and more).
Read more about RDRM Sanders by visiting: http://www.navy.mil/navydata/bios/navybio.asp?bioID=385
Tuesday, March 20, 2012
Monday, March 19, 2012
NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE
Everyone is talking about the NSA Spy Lab in Utah.
but.... the I want to work in in Hawaii!
NSA/CSS Unveils New Hawaii Center which is designed to boost intelligence integration and collaboration.
PRESS RELEASE: 6 January 2012
Tuesday, March 6, 2012
The article is below for your personal reading and judgment.
I am most excited for the events tomorrow as Mr. Cunningham visit UAT. I need some CyberSec students to make sure he gets to see our cave.
Mr. Cunningham will be in the theater at UAT from 2:30pm to 4:30pm on Wednesday March 7th .
Come out to see him talk. http://en.wikipedia.org/wiki/Ward_Cunningham
Monday, March 5, 2012
Evil Gooey Mirco Brownie
In a 12 oz coffee mug whisk together:
2 T Vegetable oil
2 T Water or coffee
1/4 tsp. Vanilla extract
Add and whisk:
2T Unsweetened cocoa powder or hot chocolate mix
2 - 4T Granulated sugar
Microwave for 45 - 70 seconds makes a molten evil gooey brownie. Center should be molten.
Enjoy with a spoon and a scoop of ice cream. Warning: Brownie will be HOT!
Tuesday, February 28, 2012
Without major flaws the Chrome developers have a harder time finding where the browser needs to be improved. It is a pretty cool concept and opportunity. Not only are they open to anyone taking a stab at their browser, they'll reward you hansomly as well. Not to mention it would be a great bullet point on a resume ;)
National Centers of Digital Forensics Academic Excellence Program
is affectionately known as CDFAE (C D Fay). UAT is exploring this as a forensic credential. Check out the mission and the website at:
Develop a partnership between academia and the government to establish standards and best practices for digital forensics practitioners, educators, and researchers to advance the discipline of Digital Forensics and increase the number of qualified professionals to meet the needs of law enforcement, counterintelligence, national defense and legal communities.
Monday, February 13, 2012
I only wish my mother understood this excerpt because it would make my life sooooo much easier.
An excerpt from the book preface of
The Practice of System and Network Administration
What Is an SA?
If you asked six system administrators to define their jobs, you would get seven different answers. The job is difficult to define because system administrators do so many things. An SA looks after computers, networks, and the people who use them. An SA may look after hardware, operating systems, software, configurations, applications, or security. A system administrator
influences how effectively other people can or do use their computers and networks.
A system administrator sometimes needs to be a business-process consultant, corporate visionary, janitor, software engineer, electrical engineer, economist, psychiatrist, mindreader, and, occasionally, a bartender.
As a result, companies calls SAs different names. Sometimes, they are called network administrators, system architects, system engineers, system programmers, operators and so on.
This book is for “all of the above.”
We have a very general definition of system administrator: one who manages computer and network systems on behalf of another, such as an employer or a client. SAs are the people who make things work and keep it all running.
The book "The Practice of Network and System Administration" on Amazon.com
In our field it is common knowledge not to use such weak passwords but it seems some people still missed that memo. It was an interesting occurrence and im surprised it took this long to reveal that a nations president had such little focus on his communications security. I guess this is a good example of job security for us :)
Thursday, February 9, 2012
The speaker is Misha Glenny - a British journalist who leaves no stone unturned in his underworld investigations of criminal globalization. AND he loves HACKERS!
...from the TED Talk abstract: Despite multibillion-dollar investments in cybersecurity, one of its root problems has been largely ignored: who are the people who write malicious code? He tells the stories and profiles several convicted hacker/coders from around the world and reaches a startling conclusion.
Wednesday, February 1, 2012
Below is the link to the trailer to Nat Geo TV special
The National Geographic TV special “Inside the NSA” seems to be running regularly on the Nat Geo TV. Below is the excerpt from the Nat Geo TV site.
Inside the NSA: America's Cyber Secrets
For decades, the U.S. government refused to acknowledge the very existence of the National Security Agency (NSA). And its still considered one of the most secretive intelligence agencies in the world. But thats about to change. With the first access given to a documentary film crew since 9/11, National Geographic goes Inside the NSA for a new one-hour special to demystify the modern-day spy agency.
Friday, January 20, 2012
Last week UAT was honored at the Phoenix ISSA quarterly chapter meeting with $2000 scholarship. This year Phoenix ISSA generously doubled their Spring scholarship contribution.
This means more Phoenix ISSA scholarship opportunity for the UAT CyberSecurity Students.
UAT loves ISSA!!
Look to the UAT foundation for how to apply for the scholarship.