Colonial Pipeline is a harbinger of things to come in business

Six days after the Colonial Pipeline was attacked by cyberhackers and left millions hanging at the gas pump, they have gained control of their operations once again. But not before the refinery paid their attackers $5 million in untraceable cryptocurrency, according to…

Colonial Pipeline: Pres. Biden’s Cybersecurity Executive Order, Economic Impacts, Gas Shortages & Ransomware Attack: Kogod School of Business Experts Available

  WHAT: After almost a week of being shut down due to a ransomware attack, the Colonial Pipeline has finally restarted operations yesterday evening. The shut down caused panic throughout the East Coast with gas stations experiencing shortages and very…

Cybersecurity in the Blue Economy

More than two-thirds of the Earth’s surface is covered by the oceans and seas. Over the next decade, these vast waters are expected to add $3 trillion to the global economy by generating electricity using marine renewable energy (MRE) devices. These “blue economy” technologies harness power across waves, tides, and currents that could reduce the carbon footprint from energy production and provide grid stability to remote coastal communities.

UA Little Rock makes COSMOS a designated research center

The University of Arkansas at Little Rock Collaboratorium for Social Media and Online Behavioral Studies (COSMOS) Lab has received approval from the Arkansas Department of Education (ADHE) to become an established research center on campus.“By designating COSMOS as a formal center, UA Little Rock will be a leader and pioneer in social media analytics and social media forecasting,” said Dr.

University of Texas at Dallas Computer Scientists’ New Tool Fools Hackers into Sharing Keys for Better Cybersecurity

Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them.

The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a decoy site so the computer can learn from hackers’ tactics. The information is then used to train the computer to recognize and stop future attacks.