tag:blogger.com,1999:blog-57686168762867683282024-03-18T16:04:59.039-07:00Mid-Pacific ICT CenterMid-Pacific ICT Centerhttp://www.blogger.com/profile/08405988801150059842noreply@blogger.comBlogger2542125tag:blogger.com,1999:blog-5768616876286768328.post-26010083688400524692015-08-24T11:25:00.001-07:002015-08-24T11:25:13.784-07:00California Community Colleges TechEDge Update<img border="0" src="http://ccctechedge.org/images/newsletter/newsletter-header-1.jpg" /> <br /><b>TechEDge eNews Update | 20 August 2015 | <a href="http://ccctechedge.org/">http://ccctechedge.org</a> <br /><br />Leading Technology In Education For California's Future <br /><br /></b><div>
<b>Colleges Adopt Online Learner Readiness Tools </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2FOEI%2Fonline-learner-280x230-1.jpg" /><div>
A new series of online learner readiness tutorials is being readily embraced by community colleges, as momentum continues to build around the effort to better prepare California’s students for the realities of online learning. <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=578&Itemid=24">Read more...</a> <br /><br /><br /><b>Education Planning Pilots Enter New Phase </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2FEPI%2FEPI-300x190-2.jpg" /></div>
<div>
It has been an eventful summer for the California Community Colleges (CCC) <a href="http://cccedplan.org/">Education Planning Initiative</a> (EPI). Fall terms are beginning across our system, and the hustle and bustle on campuses is engaging students, staff and faculty in a number of ways. <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=576&Itemid=24">Read more...</a> </div>
<div>
<br /><br /><b>New Work Group To Shape CCC Assessment </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2FCCCAssess%2FCAI-280x230-1.jpg" /></div>
<div>
The California Community Colleges (CCC) <a href="http://cccassess.org/">Common Assessment Initiative</a> (CAI) is seeking volunteers to participate in a work group that will focus on delivery of the new assessment tool being created exclusively for the CCC. <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=574&Itemid=24">Read more...</a> <br /><br /><br /><b>OEI Updates: Getting Out Of Our Own Way </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2FOEI%2Foeiupdates-dwell-te082015.jpg" /></div>
<div>
Before I get into the post for this month, I want to sincerely thank the online instructors from the <a href="http://ccconlineed.org/">Online Education Initiative</a> (OEI) pilot colleges who will be opening their courses in Canvas this month (some this week!). You have been so patient with us and have worked so hard to get to this point, and I so respect your innovative strength and willingness to step up for the students of the California Community Colleges (CCC). <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=575&Itemid=3">Read more...</a> <br /><br /><br /><b>InCommon Shibboleth Installation Workshop </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2Fchancellors%2Fshib-training.jpg" /></div>
<div>
To help California’s community colleges get the most from participation in the InCommon Federation, Internet2 is offering a workshop for IT staff focused on installation and support of the latest Shibboleth software. <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=572&Itemid=24">Read more...</a> <br /><br /><br /><b>Introducing The New CollegeBuys Website </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2Fchancellors%2Fcollegebuys-main.jpg" /> <br /><br />The Foundation for California Community Colleges has redesigned its website, <a href="http://foundationccc.org/">foundationccc.org</a>, as part of continued efforts to streamline access to valuable resources for colleges. Visitors to <a href="http://collegebuys.org/">collegebuys.org</a> can expect to see some welcome improvements. <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=571&Itemid=24">Read more...</a> <br /><br /> <br /><b>Online Learning Conference, Oct. 14-16 </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2Fsloan%2FOLC_Logo_2015_280x230.jpg" /></div>
<div>
Keynotes and conference sessions have been announced for the Online Learning Consortium’s (OLC) 21st International Conference being held Oct. 14-16 in Orlando, Fla. <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=573&Itemid=24">Read more...</a> <br /><br /><br /><img border="0" src="http://ccctechedge.org/images/newsletter/newsletter-ccc-logo.gif" /> </div>
</div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com346tag:blogger.com,1999:blog-5768616876286768328.post-44545609346764598052015-08-20T11:59:00.000-07:002015-08-20T12:00:13.326-07:00Community Colleges Task Force on Workforce Education Recommends Important Changes to Increase California Competitiveness and Job Creation<br /> To view this press release on our website or to access it in a different file format (i.e. <a href="http://baccc.us1.list-manage2.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=c37bd20fa3&e=d1c50b7de0">HTML</a>, <a href="http://baccc.us1.list-manage.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=f2b7a3281e&e=d1c50b7de0">plain text</a>, <a href="http://baccc.us1.list-manage.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=6bb98cc0f1&e=d1c50b7de0">Word</a> or <a href="http://baccc.us1.list-manage.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=57e1141b4b&e=d1c50b7de0">PDF</a>), please visit: <a href="http://baccc.us1.list-manage.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=76a357e269&e=d1c50b7de0">http://californiacommunitycolleges.cccco.edu/Newsroom/PressReleases/2015PressReleases.aspx</a><br /> <br /> <br /> PRESS RELEASE August 19, 2015<br /> Contact: Paige Marlatt Dorr<br /> Office: 916.327.5356<br /> Cell: 916.601.8005<br /> Office email: pdorr@cccco.edu<br /> <br /><b> Community Colleges Task Force on Workforce Education Recommends<br /> Important Changes to Increase California Competitiveness and Job Creation</b><br /> <br /> SACRAMENTO, Calif. – A California Community Colleges task force has put forth 25 recommendations to strengthen workforce education throughout the 113-college system with the goal of closing the skills gap that employers say is a barrier to filling existing jobs and fueling job creation.<br /> <br /> The <a href="http://baccc.us1.list-manage.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=7b8ac55c86&e=d1c50b7de0">Task Force on Workforce, Job Creation, and a Strong Economy</a> is comprised of representatives from community colleges, the business community, labor groups, public agencies involved in workforce training, K-12 policymakers, and community-based organizations. It was commissioned to address California’s anticipated shortage of 1 million skilled workers with industry-valued middle-skill degrees, certificates, and credentials.<br /> <br /> “These recommendations, if approved by the Board of Governors, will allow community colleges to build on their longstanding success educating California’s workforce and provide our economy with a more responsive framework for meeting industry needs and getting students into good paying jobs,” said California Community Colleges Chancellor Brice W. Harris. “I want to thank the task force members for their vision and their work developing this comprehensive plan.” <br /> <br /> Key recommendations of the task force call on the college system to: <br /><ul>
<li>Revise career technical education (CTE) curriculum approval processes to ensure that instructional programs keep pace with industry needs. </li>
<li>Increase the pool of qualified CTE instructors through hiring practices and consider options for meeting minimum qualifications to better integrate experienced industry professionals into instructional programs. </li>
<li>Expand partnerships with employers to increase student work-based learning opportunities such as apprenticeships and internships that provide real workplace experience. </li>
<li>Strengthen students’ career planning, work readiness, employability and technology skills as they build their occupation-specific skills. </li>
<li>Establish a sustained, supplemental funding source to increase community college capacity to create, adapt and maintain quality CTE courses and programs responsive to regional labor market needs. </li>
</ul>
“To ensure that Career Technical Education courses keep pace with the increasing demand for middle skill jobs we need funding targeted to support these programs, which have higher start-up and operational costs,” said Sunita Cooke, chair of the task force and president/superintendent of MiraCosta Community College District.<br /> <br /> The task force held 14 regional college and faculty meetings with more than 700 participants in addition to six town hall meetings held across the state that attracted 500 participants who depend on the community colleges for workforce training. Final town hall meetings summarizing all 25 recommendations will be held in Los Angeles on Aug. 25 and in San Francisco on Aug. 27.<br /> <br /> To read the full set of recommendations, please go to <a href="http://baccc.us1.list-manage.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=659a3f3454&e=d1c50b7de0">http://bit.ly/1IpCGOM</a>. The recommendations will go to the Board of Governors as an information item at its September 2015 meeting, and the board will consider taking action on the recommendations in November.<br /> <br /> The California Community Colleges Chancellor’s Office <a href="http://baccc.us1.list-manage.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=3abbc921d9&e=d1c50b7de0">Doing What Matters for Jobs and the Economy</a> framework and the <a href="http://baccc.us1.list-manage1.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=97ea806ccd&e=d1c50b7de0">Student Success Initiative</a> provided the foundation to launch this task force and have also been working to increase workforce and economic competitiveness. These measures are necessary in light of statistics indicating that there will be 6.3 million job openings in California through 2020, of which 2 million jobs will require a post-secondary certificate or associate degree.<br /> <br /> The California Community Colleges is the largest system of higher education in the nation composed of 72 districts and 113 colleges serving 2.1 million students per year. Community colleges supply workforce training, basic skills education and prepare students for transfer to four-year institutions. The Chancellor’s Office provides leadership, advocacy and support under the direction of the Board of Governors of the California Community Colleges. For more information about the community colleges, please visit <a href="http://baccc.us1.list-manage.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=3e39161c52&e=d1c50b7de0">http://californiacommunitycolleges.cccco.edu/</a>, <a href="http://baccc.us1.list-manage1.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=603330e1ca&e=d1c50b7de0">https://www.facebook.com/CACommColleges</a>, or <a href="http://baccc.us1.list-manage.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=66d8aa1e20&e=d1c50b7de0">https://twitter.com/CalCommColleges</a>.<br />James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com4tag:blogger.com,1999:blog-5768616876286768328.post-59834403879314443052015-08-20T11:57:00.001-07:002015-08-20T11:57:28.225-07:00Advanced Cyberforensics Education Consortium Webinar<br /><b>Advanced Cyberforensics Education Consortium <br /><br /> will discuss CYBERFORENSICS <br /><br />Friday, August 28th at 11 a.m. EDT. </b><br /> <br /> <br /><br /><img border="0" src="http://files.ctctcdn.com/44e8a08e001/9ab5b32a-05c6-4d2a-90d4-353a00b95021.png" /> <br /> <br /><br />Learn about the hundreds of online instructional videos, four course Digital Forensics sequence and more resources that are available to make your life easier! <br /><br /><a href="https://docs.google.com/forms/d/1pT5ivw6iZqUANtyXAErtQAEc6UQxnhihTTdRfSSFZ6A/viewform?edit_requested=true">Register TODAY for this FREE webinar</a>. <br /> <br /><br />Questions? Contact <a href="mailto:info@nationalcyberwatch.org">info@nationalcyberwatch.org</a>. <br /><br /> James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com1tag:blogger.com,1999:blog-5768616876286768328.post-30211948038236426122015-08-20T09:39:00.001-07:002015-08-20T09:42:25.983-07:00National Cyber League (NCL) Registration is Now Open!<div style="text-align: center;">
<img border="0" height="399" src="https://lh4.googleusercontent.com/proxy/8fmUzV6RBwq5G6O7hP5ezO72Gc-LWgpm5PHoRr5PTvYB0MVQFmUriA8rMA6hTZuE-wlG9ZtKrBi7PebJFKa9XMkIWcaNeqajpFSs4lSODb4Ege2N7lT5gdTuBBvcvDtmJQ" width="400" /></div>
<br /><div style="text-align: center;">
<b><span style="color: red; font-size: large;">Bigger, bolder and better than EVER...</span></b></div>
<b><span style="color: red; font-size: large;"><div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<b>the new NCL gaming system is now powered by Cyber Skyline.</b></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<b>Register for National Cyber League TODAY!</b></div>
</span></b><div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<a href="http://r20.rs6.net/tn.jsp?f=001p89V4jXu22UqzkgUQ84O-liYc6TkgJDJhkB3oW6_fTUZ2hEbUEzra_mbK-lFV7dMRwYdwQ1eB1PoRnxSXHGVgOjUPVQnMOjTokMmo_-vunFZUENsNPe3meidlkL7Ux3Z1ruJVB8r6aliPXARsxwW060WcK57IiJFTVVOT0PQmLi8TgmObOK2C0pbRVRsj7Oy5pD8_VP-D4kJ7e4T8mJqgA==&c=Hs1-JQdmavij7diXcE6Cznja5Eh-lQXP7QtP1yiWns89AQ0Ys17Y0w==&ch=mN0kzHEIQdLO5ixPIlFvE5hKTTOkupZUQ53c09Rf1Q6HVZ1eIAWYow==">CLICK HERE TO REGISTER</a> </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<a href="http://r20.rs6.net/tn.jsp?f=001p89V4jXu22UqzkgUQ84O-liYc6TkgJDJhkB3oW6_fTUZ2hEbUEzra_mbK-lFV7dM2d9jBmQ71BgzjOYdW90TQnmUY1EfYAHdBb4y8Q54ihtalpLN6DqJ3G2v997Gg-sbKGeRi0EY_q7LKSRoZy1505gd7Bj3_ZLrhqfPQ2uO8iahtMIQH0pkZMKQ0Ai1HvyvK11ordk0VQY=&c=Hs1-JQdmavij7diXcE6Cznja5Eh-lQXP7QtP1yiWns89AQ0Ys17Y0w==&ch=mN0kzHEIQdLO5ixPIlFvE5hKTTOkupZUQ53c09Rf1Q6HVZ1eIAWYow==">www.nationalcyberleague.org</a> </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Questions? </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Email <a href="mailto:info@nationalcyberleague.org">info@nationalcyberleague.org </a></div>
<!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Ffiles.ctctcdn.com%2F44e8a08e001%2F379dbab4-9c17-41d0-acca-4e732035e011.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://lh4.googleusercontent.com/proxy/8fmUzV6RBwq5G6O7hP5ezO72Gc-LWgpm5PHoRr5PTvYB0MVQFmUriA8rMA6hTZuE-wlG9ZtKrBi7PebJFKa9XMkIWcaNeqajpFSs4lSODb4Ege2N7lT5gdTuBBvcvDtmJQ" -->James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com1tag:blogger.com,1999:blog-5768616876286768328.post-65142375688430918552015-08-20T09:37:00.003-07:002015-08-20T09:37:59.707-07:00Tutorials For Online Students Free To 113 California Community Colleges<a href="http://baccc.us1.list-manage1.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=8a30ffabaf&e=b3eb67558f">Tutorials For Online Students Free To 113 Colleges</a><br /> <br /> A new tool to support online student success is now available free to all 113 California Community Colleges (CCC), made possible as part of the systemwide Online Education Initiative (OEI).<br /> <br /> The OEI Online Student Readiness Tutorials were specifically designed to be easy for California colleges to include in existing online courses and learning environments.<br /> <br /> The OEI team encourages colleges statewide to include the new readiness solutions in their online course offerings or at any point they see as appropriate for preparing students to be successful. Providing access for students is as easy as providing a single link to the combined resources. Links are also available for individual components of the tutorials should a college wish to segment resources based on student need.<br /> <br /> An overview and links to the Online Student Readiness Tutorials are available from:<br /> <a href="http://baccc.us1.list-manage1.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=ab2c0e13c8&e=b3eb67558f">http://apps.3cmediasolutions.org/oei/</a><br /> <br /> Questions and comments may be directed to the OEI Online Student Support Services Team:<br /> <br /> Bonnie Peters, <a href="mailto:bpeters@ccconlineed.org">bpeters@ccconlineed.org</a><br /> Anita Crawley, <a href="mailto:acrawley@ccconlineed.org">acrawley@ccconlineed.org</a>James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com3tag:blogger.com,1999:blog-5768616876286768328.post-56344760536355175212015-08-13T02:21:00.003-07:002015-08-13T02:28:59.380-07:00National Cyber League (NCL) Registration Opens Saturday, August 15th<div style="text-align: center;">
<span style="font-weight: bold;"><span style="font-size: x-large;"><br /></span></span></div>
<b><span style="font-size: x-large;"></span></b><br />
<div style="text-align: center;">
<b><span style="font-size: x-large;"><b>Get psyched to become </b></span></b></div>
<b><span style="font-size: x-large;">
</span></b>
<div style="text-align: center;">
<b><span style="font-size: x-large;"><b>Cyber Superheros...</b></span></b></div>
<b><span style="font-size: x-large;">
</span></b><br />
<div style="text-align: center;">
<img height="331" src="https://lh6.googleusercontent.com/proxy/6AbrUsXJvV3xnG0w2yUWnopdbv3fZcVv4b8StyNfdxIq15Bo0Aftb4rd1ABF1vdVzU8BYJTEtYGQijgTl5Jjn8ZWYvI72bX58e3FtLOzuFEPS8KsVunhOmPcuHujvCZ1XJQVBdU8qv2aMdAHNWQt7w" width="400" /></div>
<br />
<br />
<b><span style="color: red;">NCL registration opens this Saturday, August 15th</span></b><br />
Bigger, bolder and better then EVER...<br />
the new NCL gaming system is now powered by Cyber Skyline!<br />
<br />
Learn more about NCL<br />
<a href="http://t2708796.omkt.co/track.aspx?id=402|29553C|6A25|BB3|457|0|437|1|480C6419&destination=http%3a%2f%2fwww.nationalcyberleague.org%2findex.shtml&dchk=6D2288E">CLICK HERE</a><br />
<br />
<a href="mailto:info@nationalcyberleague.org">info@nationalcyberleague.org</a>
<!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fi.omkt.co%2FFiles%2F402%2F29553C%2F11634%2F757c9f322fe544d2b27842a8f9ea2b83%2F0%2FNCL-Superhero.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://lh6.googleusercontent.com/proxy/6AbrUsXJvV3xnG0w2yUWnopdbv3fZcVv4b8StyNfdxIq15Bo0Aftb4rd1ABF1vdVzU8BYJTEtYGQijgTl5Jjn8ZWYvI72bX58e3FtLOzuFEPS8KsVunhOmPcuHujvCZ1XJQVBdU8qv2aMdAHNWQt7w" -->James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-41454007812207949022015-07-30T10:48:00.001-07:002015-07-30T10:48:52.817-07:00CyberWatch West Invitation<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-hvWTxJRLEQE/VbpjHA32DjI/AAAAAAAAAXA/ovMcBDAkN5k/s1600/CWW%2BLogo-color.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="103" src="http://2.bp.blogspot.com/-hvWTxJRLEQE/VbpjHA32DjI/AAAAAAAAAXA/ovMcBDAkN5k/s320/CWW%2BLogo-color.jpg" width="320" /></a></div>
<div class="MsoPlainText">
<br /></div>
<div class="MsoPlainText">
CyberWatch West would like to invite all MPICT member
institutions to join our center. </div>
<div class="MsoPlainText">
<br /></div>
<div class="MsoPlainText">
CyberWatch West is a regional center for
Cybersecurity education covering 14 states in the western US. We are heavily
involved in many of the same initiatives as MPICT, including advocating for an
ICT transfer model curriculum and continuing support for the ICT winter
conference in CA.<o:p></o:p></div>
<div class="MsoPlainText">
Member benefits include travel sponsorships and training
and there is no cost to join. For more information, please go to <a href="http://cyberwatchwest.org%3Chttp/cyberwatchwest.org/">http://cyberwatchwest.org</a>.<o:p></o:p></div>
<div class="MsoPlainText">
<br /></div>
<div class="MsoPlainText">
To see our member map and to apply for membership, go
here: <a href="http://cyberwatchwest.org/index.php/about-us/member-map">http://cyberwatchwest.org/index.php/about-us/member-map</a>.<o:p></o:p></div>
<div class="MsoPlainText">
<br /></div>
<br />
<div class="MsoPlainText">
For additional information, please contact Corrinne Sande
(PI for CyberWatch West) at <a href="mailto:csande@whatcom.ctc.edu">csande@whatcom.ctc.edu</a>.<o:p></o:p></div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-65863844852222450112015-07-29T10:37:00.001-07:002015-07-29T10:37:52.833-07:00California Workforce Investment Board Name ChangeGovernor Brown recently signed AB1270 changing the name of the California Workforce Investment Board to the California Workforce Development Board.<br /> <br /> On Monday August 3, 2015, the board website address name will change to <a href="http://baccc.us1.list-manage2.com/track/click?u=5f87d80db4f4ddda448cb17aa&id=203ce581fb&e=d1c50b7de0">www.cwdb.ca.gov</a>. Please refresh or clear your browser if the page does not automatically show up. Be sure to update your favorites or bookmarks.James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-57786447704404117592015-07-28T12:41:00.000-07:002015-07-28T12:41:23.046-07:00BBC: WTO strikes 'landmark' IT trade deal<br />24 July 2015 <a href="http://www.bbc.com/news/business-33647358">BBC</a><div>
<br /><img height="224" src="http://ichef-1.bbci.co.uk/news/660/cpsprodpb/D3B3/production/_84459145_afpchipfirm3.jpg" width="400" /></div>
<div>
<i>Chipmakers like Japan's Renesas will benefit from the deal</i><br /><b>The World Trade Organisation (WTO) has struck a "landmark" deal to cut tariffs on $1.3 trn (£838bn) worth of technology products.</b><br /><a href="https://www.wto.org/english/news_e/news15_e/ita_23jul15_e.htm">The deal will </a>update the 18-year-old IT Agreement and add 200 products to the zero tariff list.<br /><br />It is expected to give a boost to producers of goods ranging from video games to medical equipment.<br /><br />The <a href="https://www.wto.org/english/tratop_e/inftec_e/inftec_e.htm">WTO says the sum</a> is equal to global trade in iron, steel, textiles and clothing combined.<br /><br />"Today's agreement is a landmark," said WTO Director-General Roberto Azevedo.<br /><br />"Eliminating tariffs on trade of this magnitude will have a huge impact," he continued.<br /><br />"It will support lower prices - including in many other sectors that use IT products as inputs - it will create jobs and it will help to boost GDP growth around the world."<br /><br />The final technical details will be worked out until December.<br /><br />The existing 1996 IT agreement was seen by industry and policy makers as woefully out of date as it did not cover devices and products invented since then.<br /><br />Products added range from advanced computer chips to GPS devices, medical equipment, printer cartridges and video-game consoles<br /><br />Technology manufacturers such as General Electric, Intel, Texas Instruments, Microsoft and Nintendo are among the many companies expected to benefit from the deal.<br /><br />Negotiations on updating the technology agreement began in 2012.<img src="http://ichef.bbci.co.uk/news/624/media/images/75306000/jpg/_75306515_line976.jpg" /><br /><br /><b>Analysis: Andrew Walker, BBC World Service economics correspondent</b><br />Finally, the WTO has brought its Information Technology Agreement (ITA) into the 21st century.<br /><br />This was the first tariff cutting agreement the WTO has managed since ITA 1.0, as it is not officially known, was agreed.<br /><br />The key political deal was done in 1996 at a WTO ministerial conference in Singapore. Sadly, you might think, I was there and am still covering the same story, though I have had very little reason to think about this one since.<br /><br />Still this is an important step, and it is the second one the WTO has taken in two years - a very short period in the geological timescales of trade negotiations.<br /><br />The other was an agreement on simplifying trade procedures, the one concrete achievement of the negotiations called the Doha Round launched in 2001.<br /><br />So a significant step towards more liberalised trade has been taken. But the WTO has the rest of the wide ranging and complex Doha Round still to do.</div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-39572209353675507732015-07-24T11:40:00.000-07:002015-07-24T11:40:22.570-07:00NSF Alliance for Innovation Grant Opportunities<a href="http://t.sidekickopen15.com/e1t/c/5/f18dQhb0S7lC8dDMPbW2n0x6l2B9nMJW7t5XX43M2bmdW8q5y941pwYmHW1p7ZwM56dG70f2TzVyq02?t=http%3a%2f%2fnsfallianceforinnovation.cmail1.com%2ft%2fj-i-hrlyuyy-l-r%2f&si=4660374484287488&pi=1fed8bf9-1c19-4cfb-8189-d11dc0b95a16"><img border="0" src="http://i1.cmail1.com/ei/j/B3/7AB/421/071705/csfinal/nsf-alliance-logo-email.png" /></a> <br /><img border="0" height="267" src="http://i1.cmail1.com/ei/j/B3/7AB/421/071705/csfinal/iStock_000028306600_Double.jpg" width="400" /> <br /><br />Dear colleagues, <br /><br />We are pleased to introduce the Alliance for Innovation—a program funded by the National Science Foundation designed to help California Community College STEM students engage in hands-on research that increases economic competitiveness and prepares students for the workforce. <br /><br />Sub-grants of up to $30,000 are available to teams of community college faculty and students interested in partnering with NSF-funded small business. Projects will assist NSF-funded small business in the commercialization of innovative research. Visit our website, <a href="http://t.sidekickopen15.com/e1t/c/5/f18dQhb0S7lC8dDMPbW2n0x6l2B9nMJW7t5XX43M2bmdW8q5y941pwYmHW1p7ZwM56dG70f2TzVyq02?t=http%3a%2f%2fnsfallianceforinnovation.cmail1.com%2ft%2fj-i-hrlyuyy-l-y%2f&si=4660374484287488&pi=1fed8bf9-1c19-4cfb-8189-d11dc0b95a16">nsf.foundationcccc.org</a>, to see a list of sample projects. <br /><br />NSF supplemental funding is designed to foster deeper partnerships between community colleges and the small business community while increasing participation of underrepresented groups in both academic and small business research through encouraging careers in STEM fields. The grant is the result of a collaboration between the NSF's Division of Industrial Innovation, the Alliance’s Small Business Innovation Research (SBIR) and Small Business Technology Transfer (SBTT) programs, and the Division of Undergraduate Education. <br /> <br /><b>Advancing STEM Research and Student Opportunities </b><br />The Alliance for Innovation program, which is administered by the Foundation for California Community Colleges (Foundation), is assisting faculty and student research teams in connecting with businesses in their community that are engaged in innovative research and want to support undergraduate STEM studies. California Community College research teams have the opportunity to engage in hands-on research with small businesses working on NSF-funded projects. <br /><br /><b>Get Involved </b><br />The Foundation for California Community College’s experienced team assists with the matchmaking process between colleges and businesses and can assist with the development of compelling and competitive grants. <br /><br />Currently, eligible businesses are mostly concentrated in Los Angeles, San Diego, and the Bay Area. Contact a regional expert to learn more about the program, or complete a <a href="http://t.sidekickopen15.com/e1t/c/5/f18dQhb0S7lC8dDMPbW2n0x6l2B9nMJW7t5XX43M2bmdW8q5y941pwYmHW1p7ZwM56dG70f2TzVyq02?t=http%3a%2f%2fnsfallianceforinnovation.cmail1.com%2ft%2fj-i-hrlyuyy-l-j%2f&si=4660374484287488&pi=1fed8bf9-1c19-4cfb-8189-d11dc0b95a16">faculty interest form</a> to connect with an eligible research project. <br /><br />Warm regards, <br /><br />Iris Aguilar<br /> Foundation for California Community Colleges<br /> Special Projects Manager<br /> <a href="mailto:iaguilar@foundationccc.org">iaguilar@foundationccc.org</a><br /> <a href="tel:916.325.1858">916.325.1858</a> <br /><br />Iraj B. Nejad, Ph.D.<br /> Mt. San Antonio College <br /> Professor, Chemistry Department <br /> <a href="mailto:inejad@mtsac.edu">inejad@mtsac.edu</a><br /> <a href="tel:909.594.5611%20x4535">909.594.5611 x4535</a> <br /><br />Zhanjing (John) Yu, PhD, PE <br /> Solano Community College <br /> Dean, School of Math and Science <br /> <a href="mailto:Zhanjing.Yu@solano.edu">Zhanjing.Yu@solano.edu</a><br /> <a href="tel:707.864.7110">707.864.7110</a><br /><br /><a href="http://t.sidekickopen15.com/e1t/c/5/f18dQhb0S7lC8dDMPbW2n0x6l2B9nMJW7t5XX43M2bmdW8q5y941pwYmHW1p7ZwM56dG70f2TzVyq02?t=http%3a%2f%2fnsfallianceforinnovation.cmail1.com%2ft%2fj-i-hrlyuyy-l-t%2f&si=4660374484287488&pi=1fed8bf9-1c19-4cfb-8189-d11dc0b95a16"><img border="0" src="http://i2.cmail1.com/ei/j/B3/7AB/421/071705/csfinal/nsf-alliance-email-foundation-logo.png" /></a> James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-27292401652504955652015-07-23T13:09:00.001-07:002015-07-23T13:09:23.944-07:00CCC TechEDge<img border="0" src="http://ccctechedge.org/images/newsletter/newsletter-header-1.jpg" /> <br /> <br />TechEDge eNews Update | 23 July 2015 | <a href="http://ccctechedge.org/">http://ccctechedge.org</a> <br /><br />Leading Technology In Education For California's Future <br /><br /><b>State Center District Takes The Initiative </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2FEPI%2Fstatecenterccd-te072315.jpg" /><div>
<br /></div>
<div>
Technology in support of student success is a priority at State Center Community College District (SCCCD), which serves more than 44,000 students across California’s Central Valley. <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=565&Itemid=24">Read more...</a> <br /><br /><br /><b>Systemwide Technology Support Site Debuts </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2FCCCApply%2FCCCTechnology-280x280-2.jpg" /></div>
<div>
<br /></div>
<div>
The California Community Colleges (CCC) Technology Center has launched CCCTechnology.info, a self-service help site it hopes will become a technical support “community” for college staff using systemwide technology products. <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=562&Itemid=24">Read more...</a> <br /><br /> <br /><b>Colleges Embrace InCommon Certificate Service </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2Fchancellors%2Fincommon-certs-280x123.jpg" /></div>
<div>
<br /></div>
<div>
Internet2’s InCommon organization has released a price list for security certificate services being offered at reduced cost to all California Community Colleges (CCC) entities that choose to join the InCommon Federation. <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=561&Itemid=24">Read more...</a> <br /><br /> <br /><b>OEI Updates: Making The Impossible Possible </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2FOEI%2Fpat-james%281%29.jpg" /></div>
<div>
<br /></div>
<div>
So it’s a hot and muggy summer in California. Much of the community colleges community is taking a well-deserved break from the pace of providing education to more than 2 million students. Those of us working within the <a href="http://ccconlineed.org/">Online Education Initiative</a> (OEI) are trying to carve out a couple of days here and there to rest. However, it’s really hard to find that time! <br /><br />Somehow, we have found ourselves in mid-July with the beginning of the fall term staring us squarely in the face. Where did June go? <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=564&Itemid=3">Read more...</a> <br /><br /> <br /><b>Watch CCCAssess Platform Development Progress </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2FCCCAssess%2Fcai-te072315.jpg" /></div>
<div>
<br /></div>
<div>
With development of a statewide Common Assessment System underway, California Community Colleges (CCC) personnel are invited to take part in the effort by providing feedback on progress to date at regular intervals. <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=563&Itemid=24">Read more...</a> <br /><br /> <br /><b>Workshop Highlights Need For Security Policies </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2Fsecuritynews%2Fsecurity-folo_280x230.jpg" /></div>
<div>
<br /></div>
<div>
College technology budgets don’t always have room for purchasing expensive information security systems, but it’s not necessary to spend a lot to secure your network, according to security experts in the California Community Colleges (CCC). <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=566&Itemid=24">Read more...</a> <br /><br /> <br /><b>Colleges To Get Deep Discounts On Network Gear </b><br /><img border="0" src="http://ccctechedge.org/templates/techedge/image-thumb.php?img=%2Fimages%2Fstories%2Farticles%2Fchancellors%2Ffoundation_logo_280w.jpg" />The Foundation for California Community Colleges has secured agreements with three resellers of Cisco products that will allow individual colleges and districts to purchase networking equipment at discounts of more than half off the list price. <br /><br /><a href="http://ccctechedge.org/index.php?option=com_content&view=article&id=560&Itemid=24">Read more...</a> <br /><br /><br /><img border="0" src="http://ccctechedge.org/images/newsletter/newsletter-ccc-logo.gif" /> <br /><img border="0" src="http://ccctechedge.org/index.php?option=com_acajoom&Itemid=999&act=log&listid=1&mailingid=239&subscriber=4273" /></div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-53225775205142703602015-07-23T10:54:00.001-07:002015-07-23T10:54:24.703-07:00Cybersecurity Competition Federation: The Cyberfed Show<img height="250" src="http://i.omkt.co/Files/402/29553C/115EF/6e2bca77f3cb445abbec91831820534d/0/CyberFed+Lost+imge-01-2.png" width="400" /> <br /><br /><b>Cybersecurity Competition Federation <br />(CyberFed) </b><br />closes the gap among the SILOS of cybersecurity competitions by bringing unity and illuminating the pathways into the career of cybersecurity. <br /><br /><a href="http://t2708796.omkt.co/track.aspx?id=402|29553C|57CB|827|602|0|659|1|67FBD202&destination=http%3a%2f%2fwww.cyberfed.org&dchk=21F13960">Click here to learn more!</a> <br /><br /><img border="0" height="320" src="http://i.omkt.co/Files/402/29553C/110CE/7d8bfa3f06694b87a2af28f5d9042eb4/0/CyberFed+Show+logo-01.png" width="315" /> <br /><br />The CyberFed Show highlights various cybersecurity competitions. <br /><br />By subscribing, you will get a weekly birds-eye view into various competitions across the world. <br /><br />To subscribe to The CyberFed Show <br /><br /><a href="http://t2708796.omkt.co/track.aspx?id=402|29553C|57CB|827|602|0|65A|1|67FBD202&destination=https%3a%2f%2fwww.youtube.com%2fchannel%2fUCqru5uPONxySBARWAmONQcg&dchk=1F2A0AA5">CLICK HERE</a> <br /><img border="0" height="77" src="http://i.omkt.co/Files/402/29553C/112F3/b367cb270fa24becb735eb97c2c5df25/0/CyberFed+Logo+Two-01.png" width="200" /> <br /><a href="http://t2708796.omkt.co/track.aspx?id=402|29553C|57CB|827|602|0|660|1|67FBD202&destination=http%3a%2f%2fwww.cyberfed.org&dchk=21F13960">www.cyberfed.org</a> James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-15157171154449464832015-07-22T11:21:00.001-07:002015-07-22T11:21:35.092-07:00BBC: Car hack uses digital-radio broadcasts to seize control<br />By Chris Vallance BBC Radio 4<br /><br /><a href="http://www.bbc.com/news/technology-33622298">BBC</a><div>
<br /><img height="224" src="http://ichef.bbci.co.uk/news/660/cpsprodpb/6EC9/production/_84416382_f092e87f-5250-4426-8a04-fea430d8f65c.jpg" width="400" /></div>
<div>
<i>Car infotainment systems can allow drivers to see vehicle status updates, play music and videos, view maps and in some cases run third-party apps</i><br /><b>Several car infotainment systems are vulnerable to a hack attack that could potentially put lives at risk, a leading security company has said.</b><br />NCC Group said the exploit could be used to seize control of a vehicle's brakes and other critical systems.<br /><br />The Manchester-based company told the BBC it had found a way to carry out the attacks by sending data via digital audio broadcasting (DAB) radio signals.<br /><br />It coincides with news of a similar flaw discovered by two US researchers.<br /><br />Chris Valasek and Charlie Miller <a href="http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/">showed Wired magazine that they could take control of a Jeep Cherokee</a> car by sending data to its internet-connected entertainment and navigation system via a mobile-phone network.<br /><br />Chrysler has released a <a href="http://media.fcanorthamerica.com/newsrelease.do;jsessionid=388B97DF794A3A8A01DEC233327D272F?&id=16827&mid=1">patch to address the problem</a>.<br /><br />However, NCC's work - which has been restricted to its labs - points to a wider problem.</div>
<div>
<br /></div>
<div>
<img height="256" src="http://ichef.bbci.co.uk/news/624/cpsprodpb/20A9/production/_84416380_f2de97c7-c722-44a2-a3a8-2f2d374444e7.jpg" width="400" /></div>
<div>
<i>NCC Group was able to transmit the DAB signal using a laptop and a box made from easy-to-source parts</i><br />The UK's Society of Motor Manufacturers and Traders has responded by saying that car companies "invest billions of pounds to keep vehicles secure as possible".<br /></div>
<div>
<b>Breached brakes</b><br />NCC demonstrated its technique to BBC Radio 4's PM programme at its offices in Cheltenham.<br /><br />By using relatively cheap off-the-shelf components connected to a laptop, the company's research director, Andy Davis, created a DAB station.<br /><br />Because infotainment systems processed DAB data to display text and pictures on car dashboard screens, he said, an attacker could send code that would let them take over the system.<br /><br />Once an infotainment system had been compromised, he said, an attacker could use it as a way to control more critical systems, including steering and braking.<br /><br />Depending on the power of the transmitter, he said, a DAB broadcast could allow attackers to affect many cars at once.<br /><br />"As this is a broadcast medium, if you had a vulnerability within a certain infotainment system in a certain manufacturer's vehicle, by sending one stream of data, you could attack many cars simultaneously," he said.<br /><br />"[An attacker] would probably choose a common radio station to broadcast over the top of to make sure they reached the maximum number of target vehicles."<br /><br />Mr Davis declined to publicly identify which specific infotainment systems he had hacked, at this point.<br /></div>
<div>
<b>Lab simulation</b><br />In many ways, modern cars are computer networks on wheels.<br /><br />Mike Parris, of SBD, another company that specialises in vehicle security, said modern cars typically contained 50 interlinked computers running more than 50 million lines of code.<br /><br />By contrast, he said, a modern airliner "has around 14 million lines of code".</div>
<div>
<br /></div>
<div>
<img height="225" src="http://ichef-1.bbci.co.uk/news/624/cpsprodpb/E3F9/production/_84416385_5ab3d60e-9ec6-40cc-875f-1379eb274fff.jpg" width="400" /></div>
<div>
<i>The addition of automated car controls are creating new opportunities for hackers</i><br />Such technology allows the latest cars to carry out automatic manoeuvres. For example, a driver can make their vehicle parallel park at the touch of a button.<br /><br />Mr Davis said he had simulated his DAB-based attack only on equipment in his company's buildings because it would be illegal and unsafe to do so in the outside world.<br /><br />But he added that he had previously compromised a real vehicle's automatic-braking system - designed to prevent it crashing into the car in front - by modifying an infotainment system, and he believed this could be replicated via a DAB broadcast.<br /><br />"If someone were able to compromise the infotainment system, because of the architecture of its vehicle network, they would in some cases be able to disable the automatic braking functionality," he said.<br /></div>
<div>
<b>Jeep attack</b><br />On Tuesday, Wired magazine reported that two US security researchers had managed to remotely take control of a Jeep Cherokee's air-conditioning system, radio and windshield wipers while its journalist was driving the vehicle.</div>
<div>
<br /></div>
<div>
<img height="225" src="http://ichef-1.bbci.co.uk/news/624/cpsprodpb/17838/production/_84421369_920c0847-cac3-4153-8918-6ce2ee17eee2.jpg" width="400" /></div>
<div>
<i>Wired magazine reported that a Jeep Cherokee had been hacked</i><br />Mr Valasek - director of vehicle security research at IOActive - said that NCC's attack appeared to have similarities with his own.<br /><br />"I mean that's essentially what we did over the cell [mobile] network - we took over the infotainment system and from there reprogrammed certain pieces of the vehicle so we could send control commands," he said.<br /><br />"So, it sounds entirely plausible."<br /><br />But he added that such exploits were beyond the reach of most criminals.<br /><br />"It takes a lot of time skill and money," he said.<br /><br />"That isn't to say that there aren't large organisations interested in it."<br /><br />More details about both the NCC and the US team's research will be presented to the Black Hat security convention in Las Vegas next month.</div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-46848909207375335962015-07-22T11:03:00.000-07:002015-07-22T11:03:20.987-07:00CSSIA Faculty Training Registration will be Closing SOON... <img height="65" src="http://i.omkt.co/Files/402/29553C/1153E/fa9b2b8d20574e52ad399782defc6d01/0/Screen+Shot+2015-06-28+at+6.16.59+PM.png" width="400" /> <br /><div>
<br /><span style="color: #cc0000;">Don't delay, REGISTER today! </span><br />Upcoming Trainings <br /><ul>
<li>SCADA </li>
<li>Netlabs+ User Community Workshop </li>
<li>(ISC) CISSP Course </li>
<li>EMC's Coud Infastructure & Services v2 (CIS) </li>
<li>Essentials 1 & 2: Firewall Installation, Configuration and Management </li>
<li>EMC's Information Storage & Management v2 (ISM) </li>
</ul>
TO REGISTER, <br /><br /><br /><a href="http://www.cssia.org/cssia-training.cfm"><img border="0" height="72" src="http://i.omkt.co/Files/402/29553C/10DE9/ededa76b1322499e8147959de3557de5/0/Gold+Click+Here.png" width="200" /></a> </div>
<div>
<a href="http://www.cssia.org/cssia-training.cfm">http://www.cssia.org/cssia-training.cfm</a><br /><br /><br />For questions regarding trainings, <br /><br />contact Lynn Dohm at <a href="mailto:lynn.dohm@morainevalley.edu">lynn.dohm@morainevalley.edu</a>. <br /><br /><img border="0" height="200" src="http://i.omkt.co/Files/402/29553C/F658/4d5a436c9f424eab991b6a470a54192a/0/CSSIA+Logo+Small.png" width="159" /> <br /><a href="http://www.cssia.org/">www.cssia.org</a> <br /><br />The National Resource Center for Systems Security and Information Assurance (CSSIA) | <a href="mailto:lynn.dohm@morainevalley.edu">lynn.dohm@morainevalley.edu</a> | 9000 W. College Parkway | Palos Hills, IL 60451 United States <br /></div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-87649254131315988812015-07-21T14:13:00.000-07:002015-07-21T14:24:29.547-07:00CyberCalifornia Launch<a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=3a6f1ad985&e=00dcd29271"><img border="0" height="192" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/c2a6e2c4-1523-4030-99b9-0e8702e28841.jpg" width="400" /></a><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=3a6f1ad985&e=00dcd29271"></a> <br /> <br />As we have seen in recent news headlines, security breaches can bring entire organizations, states and countries to their knees. In today's connected world, making security a top priority is no longer a choice - it's a must. As public and private organizations continue to operate within this new era of the Internet, security will become critical to maintaining trust with the public, building company reputation, as well as safeguarding data, IP and critical infrastructure.<br /> <br /> California is at the center of the digital revolution that is shaping the world around us. Already a national center of commercial cybersecurity activities, California is home to companies building the cybersecurity products and solutions that are securing commercial businesses, academic institutions and governmental organizations across the globe.<br /> <br /> In an effort to help advance the goals and promote the accomplishments of the Governor's Cybersecurity Task Force, CyberTECH, among other state and local leaders, recently launch CyberCalifornia. <br /><br /><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/41b943b7-293d-412c-84e9-d122b78bf543.png" /><br /><br />CyberCalifornia will organize public-private partnerships in cybersecurity, with the goals of facilitating research and innovation in cybersecurity, educating California businesses about cybersecurity needs and resources, and connecting California's robust workforce development system with the needs of California employers.<br /> <br /> Led by its Board of Advisors, CyberCalifornia activities include: <br />Assisting in the organization of private sector advisory groups by vertical industry such as banking and finance, high technology, agriculture, etc. <br />Assisting in the development and promotion of cybersecurity career pathways <br />Partnering with local and regional economic development organizations to inform California's small business community about cybersecurity needs and solutions <br />Establishing connections between the cybersecurity and Internet of Things sectors through activities such as conferences and media events <br /><br />To learn more about CyberCalifornia, please contact darin@cyberhivesandiego.org. <br /><br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=1bb2305235&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/7735fb57-214d-48e7-b305-aa745245a1fe.jpg" /></a> <br /><br />Darin Andersen, CEO, CyberUnited, Co-Chair, CyberTECH, Co-Chair, Economic Development Subcommittee, California Cybersecurity Task Force<br /> <br /> "CyberCalifornia: Cybersecurity and IoT Gold Rush"<br /><br />Recently, CyberTECH helped launch CyberCalifornia with other State and local leaders. The initiative is organized in conjunction with the Innovative Hub (iHub) Network, a program administered by the State Office of Economic Development and in partnership with Governor Brown's Cybersecurity Task Force.<br /><br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=36d4cc0273&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/c88517d2-129e-40a3-8eb0-316c5290b480.jpg" /></a> <br />Jerry Brown, Governor of California<br /><br /> CyberCalifornia will organize public-private partnerships in cybersecurity to better protect California's critical infrastructure, businesses and citizens from cyber threats, facilitate research and innovation in cybersecurity, educate California businesses about cybersecurity needs and resources, and connect California's robust workforce development system with the needs of California employers. <br /><br /><b>Center of Cybersecurity and Internet of Things Excellence (CCIoTE)</b><br /> California is home to the personal computer, the firewall, anti-virus and many other cybersecurity products. Today, California companies are at the forefront of new technologies ushering in the Internet of Things (IoT), the term for the phenomenon where people and things are connected to the Internet, leveraging sensors and real time analytics and cloud technologies.<br /> <br /> California's leadership role in advanced technology sectors including autonomous vehicles, biotechnology, precision in medicine and advanced manufacturing, will contribute to the State's continued excellence in cybersecurity and privacy. The powerful combination of cyber and the emergence of these innovative intensive sectors make California the perfect place to build secure next generation technologies.<br /> <br /> California has a rapidly growing information technology industry cluster and offers the full spectrum of cybersecurity capabilities. Our Golden State has tremendous assets to keep our Country safe, advance innovation with security and privacy built in and be a beacon for other States in our Nation to follow. <br /><br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=8f68b79cb2&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/acee46be-c53e-431e-9a3c-b53b513ed1d4.jpg" /></a> <br />Charles "Chuck" Brooks, Vice President, Government Relations and Marketing, Sutherland Global Services<br /> <br /><b> "Adopting a Cooperative Global Cyber Security Framework to Mitigate Cyber Threats (Before it is too Late)"</b><br />The recent OPM cyber breach at the U.S. Government's Office of Personnel Management (OPM) provided a wakeup call to the seriousness and sophistication of the cyber security threat aimed at both the public and private sectors. The fact is that over 43% of companies had breaches last year (including mega companies such as Home Depot, JPMorgan, and Target). Moreover, the intrusion threats are not diminishing. For example, British Petroleum (BP) faces 50,000 attempts at cyber intrusion every day. <br /> <br /> According to the think tank Center for Strategic and International Studies (CSIS), cyber related crime now costs the global economy about $445 billion every year. These cyber security breaches demonstrate that there is a continued need for protocols and enhanced collaboration between government and industry. <br /> <br /> In 2014 code vulnerabilities such as Heartbleed, Shellshock, Wirelurker, POODLE and other open source repositories caused chaos and harm. The cyber security community responded to those vulnerabilities with "react and patch." Unfortunately, this means of response has been for the most part, a cosmetic or band aid approach. <br /> <br /> The cyber security community's posture must change to one of wait and react to that of being proactive and holistic. It is not really a question of which policies, processes and technologies are ready and best, that will always be debatable. Being proactive means adopting a working Industry and Government Global Cyber Security Framework that would include measures for encryption, authentication, biometrics, analytics, automated network security, and a whole host of other topics related to cyber threats. <br /><br /><a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=783f7056af&e=00dcd29271">CONTINUE READING</a> <br /> <br /><a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=b4b7242f71&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/b5b49797-6898-4f75-bec2-ea870945c472.png" /></a> <br /><br /><b>LIFARS, Featured CyberTECH Member</b><br /><br />LIFARS is a digital forensics and cybersecurity intelligence firm based in New York City. With its history of investigating cybersecurity breaches across a number of industries, LIFARS is uniquely positioned to help increase cybersecurity posture to protect organizations and individuals from real-life hackers and advanced persistent threat actors. By bringing in LIFARS, you can maximize your existing investment into the cybersecurity infrastructure and make sure that your future investments are strategically placed – delivering maximum protection while preserving the productivity of your employees. For these and other reasons, LIFARS was recently ranked as the #2 cybersecurity company in New York Metro area on the Cybersecurity 500 list. <br /><br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=0a8cbefd3d&e=00dcd29271">LIFARS WEBSITE</a> <br /><br />In addition to providing robust security solutions based on best practices and personal hands-on experiences, LIFARS continuously explores the latest innovations in the cybersecurity field and always seeks to find what is shaping tomorrow's industry landscape. In a recent interview with Founder and CTO of LIFARS, Ondrej Krehel, and LIFARS' Digital Forensic Examiner, Paul Kubler, they discussed strategies and policies for cybersecurity in the world today, including common mistakes and how to make them right.<br /> <br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=d941d7531f&e=00dcd29271">LIFARS INTERVIEW</a> <br /> <br /><br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=8a1232cfa8&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/5cc486c5-ec05-43f0-a170-e8858fa3a0bb.png" /></a> <br /><div>
<br /> NXT Robotics is a San Diego-based company that designs and builds service robots to support the increasing needs of the hospitality industry. NXT Robotics' service robot platforms are able to provide delivery, security and guest-related services to customers - all while maintaining a consistent and high degree of quality. <br /> <br /> The company's founder, Jeff Debrosse has over 20 years of software engineering, cybersecurity R&D and enterprise product management and deployment experience. "This is an exciting time for NXT Robotics," said Jeff. "With access to the CyberTECH community and its resources, our success is further guaranteed."<br /> <br /> The company will be providing CyberTECH's incubator and shared workspace offices, CyberHive and iHive, with its own Nixie. "Your team, tenants and guests will find Nixie to be amazingly pleasant to deal with - not to mention, very useful!" Jeff stated.<br /> <br /> "NXT Robotics understands the importance of making cyber part of the foundation. We are thrilled to have NXT Robotics join CyberTECH as a member and look forward to working closely with Jeff and his team." said CyberTECH Co-Chair and Founder, Darin Andersen.<br /> <br /> We are proud to recognize NXT Robotics as a featured CyberTECH Member for July 2015. <br /><br /><img height="107" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/d0e55c18-4721-4a77-9a25-2a83298b3e6e.jpg" width="400" /> <br /><br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=3a0787216b&e=00dcd29271">NXT ROBOTICS WEBSITE</a> <br /><br /><br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=e36999ec27&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/61bd311d-e027-4de9-8ae3-c6aad52c2117.png" /></a> <br /> <br /><b>Bird Rock Systems, Featured CyberTECH Member</b><br /> Bird Rock Systems is a company that has been built on a foundation of exceptional customer service, technology and long-term partnership. Bird Rock Systems excels at deploying the latest enterprise class technologies including: security, routing, switching, traffic management, WAN acceleration, wireless, IP communications, storage area networking, performance computing and virtualization. Bird Rock typically begins a new client engagement by completing a network or security assessment. Their many loyal customers represent enterprise business, casino, university, Fortune 500 and government organizations requiring 'Best in Class' secure technical solutions. <br /> <br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=7310e32993&e=00dcd29271">BIRD ROCK SYSTEMS WEBSITE</a> <br /> <br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=9f4e03f475&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/7b19fcb8-5e74-4af0-a55b-e0440099fa94.png" /></a> <br /> <br /><b>iWebGate, Featured CyberTECH Member</b><br /> Founded in Australia in 2004 with global corporate operations in North America, iWebGate has pioneered a new form of virtualization technology - the Virtualization of Network Services. iWebGate's LaunchPad allows organizations to properly and securely segment networks, connectivity and devices, eliminating the need for Firewalls and VPNs as primary security and connectivity solutions. By deploying the iWebGate Workspace Suite, organizations can then integrate security and business applications into the iWebGate LaunchPad transforming them from "enterprise friendly" products into "enterprise ready" solutions. The result is faster, more secure and reliable access to networks and network services. <br /> <br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=97c207b810&e=00dcd29271">IWEBGATE WEBSITE</a> <br /> <br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=254cc15484&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/fbca9991-9466-4f87-898b-db7cfa7818d5.png" /></a> <br /> <br /><b>San Diego Venture Group Selects Fhoosh as a 2015 Cool Company</b><br /> Cybersecurity software development firm FHOOSH, Inc. has been chosen as a "Cool Company" by the San Diego Venture Group (SDVG) for a second year. One of 31 Cool Companies selected this year from over 160 applicants, FHOOSH continues to represent the leading edge of San Diego-area tech innovation.<br /> <br /> FHOOSH helps corporations, institutions and government organizations protect and power valuable stored digital information with its cybersecurity platform and productivity software. FHOOSH bankLevel+ cybersecurity safeguards an organization's critical business and customer data from cyber threats by storing it in a state that is useless to hackers. It does this approximately five times faster than storing data unencrypted, with technology that breaks apart, disassociates, separately encrypts, and then disperses the data. The system also quickly notifies network administrators when unauthorized individuals try to access FHOOSH-protected databases, object stores and file systems. FHOOSH implements with existing infrastructure and allows corporate partners to dial in the security, big data/analytics and performance they need. With 15 patents pending, FHOOSH technology has been validated by the foremost cybersecurity response and assessment firm. <br /><br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=7e2bb98b49&e=00dcd29271">CONTINUE READING</a> <br /><br /><a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=8d271dce3e&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/fb37fe20-871d-4b9f-bf6c-0f0bf8d79db2.jpg" /></a> <br />Maggey Felix, Featured CyberTECH Advisor <br /><br />Maggey Felix specializes in Marketing and Operations with 5+ years of experience in the technology and cybersecurity industry. Her passion for cybersecurity and cutting-edge technologies is shown through her dedication to helping companies better prepare, organize and market their solutions. <br /><br />Over the past two years, Maggey has worked closely with the CyberTECH organization to support various marketing and operational activities. Her ongoing effort and commitment to CyberTECH makes Maggey an invaluable member of the community. <br /><br />We are proud to recognize Maggey Felix as the featured CyberTECH Advisor for July 2015. <br /><br /><a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=abc837da17&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/a3a26303-f952-4878-8555-cae6997b93f2.jpg" /></a> <br />Julia Scholl, CyberTECH Director of Marketing and Operations <br /><br />Julia Scholl is a strategic and forward-thinking public relations and marketing professional with over five years of experience working with non-profit and startup organizations. A capable self-starter with excellent organizational and communication skills, Julia is passionate about building and fostering lasting relationships within the CyberTECH community.<br /> <br /> As Marketing and Operations Director, Julia will assist with daily operations, provide membership support as well as ongoing support with events, programs, and all other CyberTECH initiatives.<br /> <br /> We are excited to welcome Julia to CyberTECH. Please feel free to contact Julia directly at julia@cyberhivesandiego.org. <br /> <br /><br /><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/d98a6d73-a9e5-4df9-8cab-9f1cab86898f.jpg" /> <br />Jessica Herrmann, CyberTECH Events Coordinator <br /><br />Jessica Herrmann has over 20 years of experience applying key leadership, communication and problem solving skills within the hospitality industry. As Catering and Events Manager, Jessica has worked with a number of organizations to develop, manage and execute top quality events.<br /> <br /> Jessica recently joined CyberTECH as Events Coordinator where she will help with the planning, organization, preparation and execution of CyberTECH events.<br /> <br /> Please join us in formally welcoming Jessica to the CyberTECH community. <br /> <br /><b>Upcoming Events</b> <br /> <a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=21a7aa05ea&e=00dcd29271">Internet of Things (IoT) Meetup - September 17, 2015</a><br /> <br /> <a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=fe4615c43e&e=00dcd29271">SAM Fest (Startups + Art + Music) - September 23-24, 2015</a><br /> <br /> <a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=972075db57&e=00dcd29271">IoT Startup Table Breakfast - October 13, 2015</a> <br /><br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=0db187f759&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/84fa8b28-6d0b-4d68-b09a-9983e9493e16.jpg" /></a> <br /><br /><br /><a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=ba0e2ebaaf&e=00dcd29271"></a><a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=ba0e2ebaaf&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/9be6f828-5fd1-4875-85d1-5e1e7c0690f2.png" /></a><a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=ba0e2ebaaf&e=00dcd29271"></a> <br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=cce0fc8787&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/16e62043-0c6f-4497-8ce8-54b024fa4bf4.jpg" /></a> <br /><br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=a350cbbabe&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/09b893e6-1f1d-435d-a921-40b4e65d9457.jpg" /></a> <br /> <br />Check out their new brand video and you’ll see why Webpass isn’t just another ISP. They're leaders and innovators on a mission to change the way people think about the Internet. You can contact them at 1-800-Webpass! <br /><br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=417b745281&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/video_thumbnails/e40fd64a2117fc806ecfac4dd5daf5e1.png" /></a> <br /><br /><b>Step Inside Webpass! </b> <br /><b>CyberTECH 2015 Newsletter Sponsor</b><br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=70cfcb854a&e=00dcd29271">Webpass</a>, a leading Internet service provider in the San Diego area is now delivering residential Internet connections at 100, 200, or 500 Mbps and business Internet connections from 10-1000 Mbps. There has never been a better time to cut the cable and switch to Webpass for your Internet needs! As the owner and operator of its Ethernet network, Webpass promises customers a simple urban Internet experience. They distinguish themselves from the competition through the simplicity of set-up, absence of contracts and personable customer service. <br /> <br /> Sign up today and instantly browse the Internet without modems, contracts or gimmicks.<br /> <br /> Webpass<br /> 1360 5th Avenue<br /> San Diego, CA 92101<br /> 1-800-Webpass </div>
<div>
<br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=52e0b7c700&e=00dcd29271"><img border="0" src="https://lh4.googleusercontent.com/proxy/giFj_Z37QvH77jx9h7Ho_5yUxwhrfrJT9CIh_vKdQ-WN6G6ppL8CTsZp-N09CwTjtCiOlv9Ylwgu94Yoiu08G5esdSWF7_QaSPhFkzShcNrJgsV5Y_ncuvFhg-68zzU" /></a> <br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=0eee7281c7&e=00dcd29271">Facebook</a> <br /><br /><br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=559332c7ff&e=00dcd29271"><img border="0" src="https://lh5.googleusercontent.com/proxy/ILF8b18Zdh-x4QkHFNULfTeaav32Q_8b7geGafrHf8nfA1B3-wMHMR3KetcXHu1wTZDnPZjfJBJfm-aiKK17thV1p8asAvtVUE1M_fz5FSzeMd0afbgZy2F_hR4Dkw" /></a> <br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=ad99344e25&e=00dcd29271">Twitter</a> <br /><br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=1ba8aa282d&e=00dcd29271"><img border="0" src="https://lh3.googleusercontent.com/proxy/_xtpAA5xzMQStS6pKraacCppj9vm6BbsrGsxCtVCh01wvvHL2SG0aEc9e2mGZ5GFQsrjNDaAZQfQ8YCDq_noHPUpaPZt20i-XqSA3K1lOwFL2Jg2vPyN_-nv2g" /></a> <br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=a44b006184&e=00dcd29271">Website</a> <br /><br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=5787fdc402&e=00dcd29271"><img border="0" src="https://lh6.googleusercontent.com/proxy/NWQ8kwd9V8_897EjNW2sWsug2uO5SVBpB6jevQBRBiuWTaeKet0Efg4OgHtxiCyTFntinqdZTPMWEQBSGSsNklE5xzFguT3VCSO1Exp_GgPsiqRwSofeTJNsETNVgoI" /></a> <br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=98e84fd016&e=00dcd29271">LinkedIn</a> <br /><br /><img border="0" src="https://lh6.googleusercontent.com/proxy/ZIdlXRb2Gn6Owc5bCbK4Ku3Bl43f4QiGnNgPy7MudM94Yc0IRLEmsUq4GeVxrjSzROvlogAB_DMshw7IP6kZJATab8Gwbr-0-azibfRao1euJL21HjPwY9tpWUPmohRUPeAJcIBU" /> <br />Email <br /><br /><a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=d9a1c4eed9&e=00dcd29271"><img border="0" src="https://lh3.googleusercontent.com/proxy/k-TM3EC9Ik7UUfN_K5g0VT74X4JQOKZwa1signKY3DtPK8mqPGQhg_AyWmWxzLLwocO6Fbo7YzezCfvdZIFm7N_fV4gcvzR5wW8XkdwzjTnivN4C6cBoqfHsan7B3xgs" /></a> <br /><a href="http://cybertechnetwork.us8.list-manage1.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=f94fe759dc&e=00dcd29271">Instagram</a> <br /> <br /><br /><b>Get Involved!</b><br /><br />A key CyberTECH operating principle is collaboration. We are always looking to partner with individuals and organizations looking to get involved in various cyber and IoT initiatives throughout the region and across the globe. Opportunitites include event chair, volunteer, champion, program chair and more. For additional information on how you can support CyberTECH, please contact Julia Scholl. <br /><br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=4549f39a1c&e=00dcd29271"><img border="0" src="https://gallery.mailchimp.com/9615e2f3a2d6d1fa5546f8f76/images/e682f396-6e95-42a9-a618-c2f816ee8eff.png" /></a> <br /><br /><b> Join the CyberTECH Meetup Groups</b> <br /> <a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=7196b93ed1&e=00dcd29271">CyberTECH C</a><a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=b9993f7b7c&e=00dcd29271">ybersecurity Meetup</a><br /> <br /> <a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=cd28feba9e&e=00dcd29271">CyberTECH Internet of Things M</a><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=0c3d46cf32&e=00dcd29271">eetup</a> <br /><br /><br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=de0bd4933a&e=00dcd29271"><img border="0" src="https://lh4.googleusercontent.com/proxy/giFj_Z37QvH77jx9h7Ho_5yUxwhrfrJT9CIh_vKdQ-WN6G6ppL8CTsZp-N09CwTjtCiOlv9Ylwgu94Yoiu08G5esdSWF7_QaSPhFkzShcNrJgsV5Y_ncuvFhg-68zzU" /></a> <br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=3a9a9726d1&e=00dcd29271">Facebook</a> <br /><br /><a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=5f157ec869&e=00dcd29271"><img border="0" src="https://lh5.googleusercontent.com/proxy/ILF8b18Zdh-x4QkHFNULfTeaav32Q_8b7geGafrHf8nfA1B3-wMHMR3KetcXHu1wTZDnPZjfJBJfm-aiKK17thV1p8asAvtVUE1M_fz5FSzeMd0afbgZy2F_hR4Dkw" /></a> <br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=796eb97b12&e=00dcd29271">Twitter</a> <br /><br /><a href="http://cybertechnetwork.us8.list-manage2.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=472340a6c2&e=00dcd29271"><img border="0" src="https://lh3.googleusercontent.com/proxy/_xtpAA5xzMQStS6pKraacCppj9vm6BbsrGsxCtVCh01wvvHL2SG0aEc9e2mGZ5GFQsrjNDaAZQfQ8YCDq_noHPUpaPZt20i-XqSA3K1lOwFL2Jg2vPyN_-nv2g" /></a> <br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=28a9f7a149&e=00dcd29271">Website</a> <br /><br /><img border="0" src="https://lh6.googleusercontent.com/proxy/ZIdlXRb2Gn6Owc5bCbK4Ku3Bl43f4QiGnNgPy7MudM94Yc0IRLEmsUq4GeVxrjSzROvlogAB_DMshw7IP6kZJATab8Gwbr-0-azibfRao1euJL21HjPwY9tpWUPmohRUPeAJcIBU" /> <br />Email <br /> <br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=cfdc1f9752&e=00dcd29271"><img border="0" src="https://lh6.googleusercontent.com/proxy/NWQ8kwd9V8_897EjNW2sWsug2uO5SVBpB6jevQBRBiuWTaeKet0Efg4OgHtxiCyTFntinqdZTPMWEQBSGSsNklE5xzFguT3VCSO1Exp_GgPsiqRwSofeTJNsETNVgoI" /></a> <br /><a href="http://cybertechnetwork.us8.list-manage.com/track/click?u=9615e2f3a2d6d1fa5546f8f76&id=e71075be30&e=00dcd29271">LinkedIn</a> <br /><br /> Our mailing address is:<br /> 1855 1st Ave. Suite 103, San Diego, CA 92101 </div>
<!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fcdn-images.mailchimp.com%2Ficons%2Fsocial-block-v2%2Fcolor-linkedin-96.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://lh6.googleusercontent.com/proxy/NWQ8kwd9V8_897EjNW2sWsug2uO5SVBpB6jevQBRBiuWTaeKet0Efg4OgHtxiCyTFntinqdZTPMWEQBSGSsNklE5xzFguT3VCSO1Exp_GgPsiqRwSofeTJNsETNVgoI" --><!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fcdn-images.mailchimp.com%2Ficons%2Fsocial-block-v2%2Fcolor-twitter-96.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://lh5.googleusercontent.com/proxy/ILF8b18Zdh-x4QkHFNULfTeaav32Q_8b7geGafrHf8nfA1B3-wMHMR3KetcXHu1wTZDnPZjfJBJfm-aiKK17thV1p8asAvtVUE1M_fz5FSzeMd0afbgZy2F_hR4Dkw" --><!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fcdn-images.mailchimp.com%2Ficons%2Fsocial-block-v2%2Fcolor-forwardtofriend-96.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://lh6.googleusercontent.com/proxy/ZIdlXRb2Gn6Owc5bCbK4Ku3Bl43f4QiGnNgPy7MudM94Yc0IRLEmsUq4GeVxrjSzROvlogAB_DMshw7IP6kZJATab8Gwbr-0-azibfRao1euJL21HjPwY9tpWUPmohRUPeAJcIBU" --><!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fcdn-images.mailchimp.com%2Ficons%2Fsocial-block-v2%2Fcolor-link-96.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://lh3.googleusercontent.com/proxy/_xtpAA5xzMQStS6pKraacCppj9vm6BbsrGsxCtVCh01wvvHL2SG0aEc9e2mGZ5GFQsrjNDaAZQfQ8YCDq_noHPUpaPZt20i-XqSA3K1lOwFL2Jg2vPyN_-nv2g" --><!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fcdn-images.mailchimp.com%2Ficons%2Fsocial-block-v2%2Fcolor-facebook-96.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://lh4.googleusercontent.com/proxy/giFj_Z37QvH77jx9h7Ho_5yUxwhrfrJT9CIh_vKdQ-WN6G6ppL8CTsZp-N09CwTjtCiOlv9Ylwgu94Yoiu08G5esdSWF7_QaSPhFkzShcNrJgsV5Y_ncuvFhg-68zzU" --><!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fcdn-images.mailchimp.com%2Ficons%2Fsocial-block-v2%2Fcolor-instagram-96.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://lh3.googleusercontent.com/proxy/k-TM3EC9Ik7UUfN_K5g0VT74X4JQOKZwa1signKY3DtPK8mqPGQhg_AyWmWxzLLwocO6Fbo7YzezCfvdZIFm7N_fV4gcvzR5wW8XkdwzjTnivN4C6cBoqfHsan7B3xgs" -->James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com1tag:blogger.com,1999:blog-5768616876286768328.post-40388550597786692982015-07-20T10:35:00.000-07:002015-07-20T10:35:46.868-07:00BBC: United hackers given million free flight miles<br />By Chris FoxxTechnology reporter<br /><br />16 July 2015 <a href="http://www.bbc.com/news/technology-33552195">BBC</a><div>
<br /><img height="224" src="http://ichef-1.bbci.co.uk/news/660/cpsprodpb/136A/production/_84307940_united_airline.jpg" width="400" /><br /><b>US airline United has rewarded two hackers who spotted security holes in its website with a million free flight miles each.</b><br />The flight provider operates a "bug bounty" scheme that rewards hackers for privately disclosing security flaws rather than sharing them online.<br /><br />It has given the maximum reward of a million flight miles, worth dozens of trips, to two people.<br /><br />One security expert said the scheme was a big step forward for online security.<br /><br />"Schemes like this reward hackers for finding and disclosing problems in the right way. That makes the internet safer for all of us," said security consultant Dr Jessica Barker.<br /><br />"Bug bounties are common in tech companies as they tend to understand online security a bit more, but other industries are catching up," said Dr Barker.<br /></div>
<div>
<b>Cash incentives</b><br />The idea of responsible disclosure, reporting issues and giving companies time to fix them, is not new.<br /><br />Big technology companies such as Yahoo, Google and Facebook offer hackers cash incentives to report bugs privately.<br /><br />In return for receiving their flight rewards, hackers are forbidden from revealing the nature of the security holes they discovered.<br /><br />"We believe that this program will further bolster our security and allow us to continue to provide excellent service," United said on its website.<br /><br />The company declined to comment further.</div>
<div>
<br /></div>
<div>
<img height="225" src="http://ichef-1.bbci.co.uk/news/624/cpsprodpb/618A/production/_84307942_84307941.jpg" width="400" /></div>
<div>
<i>A million award miles could pay for dozens of internal flights in the US</i><br />"It's not always about hackers digging around looking for flaws. A hacker may be using a service and notice something a bit off," said Dr Barker.<br /><br />"We all benefit if they look into that," she added.<br /><br />Some critics of bug bounties say they can discourage companies from hiring professional security staff, because it's cheaper to offer hackers cash for disclosing bugs.<br /><br />Dr Barker disagrees: "It should be part of an overall approach to security, but it's definitely a good approach.<br /><br />"It encourages positive behaviour and shows young hackers that they can benefit from doing the right thing.<br /><br />"Bounties can also benefit smaller companies who can't afford to give out cash rewards but can offer free products or services, so I hope we'll see more and more bug bounties," she said.</div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-34721023312477634862015-07-16T13:24:00.001-07:002015-07-16T13:24:25.664-07:00OP-TEC Free Faculty Course in Fundamentals of Light and Lasers<a href="http://r20.rs6.net/tn.jsp?f=001BACByxdJovm52EidEhhH0nwsFtqSWh-2nyEI5_J9F0Fgm4oXungn3tKwWk32W4lFE5JPsugVB9UU4g6Mc7-6hADDPhTj8l6j-ITS5hpVL7Apey3bs7ar92pMVn4xMk6--ZeQ2eweIwbvqgMcCPdIBYFX2fXe5l6lmjkzjni_FUs=&c=3hb1AMt5-nR3LVOfX984-glxWZKrONYunAN4yE9RgSebCOYrKk0CaA==&ch=lx_mr-HPHcBfKvgr76_17UiptOJU93aKyDOgeK7S5GEjrI5dsko0hw=="><img border="0" src="http://ih.constantcontact.com/fs050/1101946745829/img/9.jpg" /></a> <br /><br /><div>
<b><a href="http://r20.rs6.net/tn.jsp?f=001BACByxdJovm52EidEhhH0nwsFtqSWh-2nyEI5_J9F0Fgm4oXungn3lCuO0Y4MIrZfUvOgsTf9H6zGJgPmwXTB0jdVQ5rabFEavHUp6dhmWLkdUy35x8Eu0TR_GVwn9JWnMtdsIMWf5wXkyBNdC05mOQew9RxdsPY42EjPUpWW97gFAynlvy92w==&c=3hb1AMt5-nR3LVOfX984-glxWZKrONYunAN4yE9RgSebCOYrKk0CaA==&ch=lx_mr-HPHcBfKvgr76_17UiptOJU93aKyDOgeK7S5GEjrI5dsko0hw==">Hybrid, Online, Self-Paced <br /> Optics and Photonics Faculty Development Course</a> <br /><br />Fundamentals of Light and Lasers </b><br /><img border="0" height="300" src="http://files.ctctcdn.com/5e3f4219001/533e2236-b725-477c-b502-7af52a68b1c5.jpg" width="400" /><img border="0" src="https://imgssl.constantcontact.com/letters/images/1101116784221/T.png" /></div>
<div>
<i>Self-paced online course opens August 1! </i><br />The National Center for Optics and Photonic Education (OP-TEC), is a National Science Foundation (NSF) National Center of Excellence with the mission of promoting photonics education and assisting colleges around the United States in developing and implementing educational programs that support expansion of this critical technology. <br /><br />OP-TEC offers a hybrid, online faculty development course in optics and photonics. This Open Entry/Open Exit course has been developed for faculty whose schedules demand a more flexible course timeline. It is perfect for busy faculty who might have difficulty keeping up with weekly assignments in a "scheduled" course, but who would have a period or periods of time during the semester or school year that would allow them to complete assignments and exams independently and at their own pace. It is also an excellent opportunity for junior faculty, adjunct faculty, and lab technicians who may need to prepare to teach a college level or dual credit introductory photonics, optics, or lasers course. <br /><br />This online course is being offered at no charge to U.S. high school, community college and technical college faculty interested in teaching a basic photonics course. <br /><br />The course will cover OP-TEC's Fundamentals of Light and Lasers, 2nd Ed. (2013) text. Modules Include: Nature and Properties of Light, Optical Handling and Positioning, Light Sources and Laser Safety, Basic Geometrical Optics, Basic Physical Optics, and Principles of Lasers. Supplementary videos and tutorials are available for enrolled instructors. <br /><br />The course is facilitated by an instructor experienced in teaching photonics concepts at the college level and will require a high level of independent self-paced instruction. The six modules will be completed online and through email with the instructor. Though this course is self-paced, participants must pass all six End of Module tests by May 31, 2016 to be eligible to attend the Capstone Laboratory Experience or receive a certificate of completion. <br /><br />Hands-on Capstone Laboratory Experience: After successful completion of all six modules by May 31, 2016, participants will be invited to participate in a 3-day hands-on Capstone Laboratory Experience at an OP-TEC partner college. The June 2016 capstone will provide participants the opportunity to conduct most of the laboratory experiments included in the course and discuss with experienced instructors best practices for teaching the materials. Capstone dates and travel information will be provided to enrolled faculty in January 2016. <br /><br />Certificate of Completion & CEUs: Participants who successfully complete the online course and the 3-day hands-on laboratory session will receive a certificate of completion from OP-TEC and may apply for CEUs from an OP-TEC partner college. Participants who successfully complete the online portion of the course only, will receive a certificate of completion for the online portion. <br /><br />Cost: No tuition or materials fees! Participants will be responsible for travel, lodging, and some meals to attend the 3-day lab session in June 2016. <br /><br /><a href="http://r20.rs6.net/tn.jsp?f=001BACByxdJovm52EidEhhH0nwsFtqSWh-2nyEI5_J9F0Fgm4oXungn3lCuO0Y4MIrZfUvOgsTf9H6zGJgPmwXTB0jdVQ5rabFEavHUp6dhmWLkdUy35x8Eu0TR_GVwn9JWnMtdsIMWf5wXkyBNdC05mOQew9RxdsPY42EjPUpWW97gFAynlvy92w==&c=3hb1AMt5-nR3LVOfX984-glxWZKrONYunAN4yE9RgSebCOYrKk0CaA==&ch=lx_mr-HPHcBfKvgr76_17UiptOJU93aKyDOgeK7S5GEjrI5dsko0hw==">Click here for more information and to apply online!</a> <br /><br />Questions? <a href="mailto:op-tec@op-tec.org">Click here to e-mail us!</a> <br /><br /> <img border="0" src="http://ih.constantcontact.com/fs196/1101946745829/img/38.gif" />NSF/ATE National Center of Excellence <br /> <br />OP-TEC National Center for Optics and Photonics Education | 316 Kelly Drive | Waco | TX | 76710 <br /> </div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-52852436608742067972015-07-16T11:09:00.000-07:002015-07-16T11:09:15.500-07:00Can Cybercompetitions Help Grow Local Security Talent?<b>Hiring cybersecurity staff is difficult, but federal, state and local governments are working with nonprofits to encourage the development of cybersecurity skills through individual and team competitions.</b><br /><div>
BY <a href="http://www.govtech.com/authors/98566464.html">DAN LOHRMANN</a> / JULY 15, 20150<br /><br />Wherever I travel, the top concern on the minds of CIOs and chief information security officers is the same — everyone needs more cybersecurity talent. The problem has become especially acute in government, where it’s compounded by an improving economy, growing enterprise cyberneeds and a retiring public workforce. The bottom line:<a href="http://www.govtech.com/security/Hiring-Cybersecurity-Staff-Is-Hard-for-States.html">Hiring cybersecurity staff</a> is hard for state and local governments.<br /><br />What can possibly be done? If the most experienced cyberexperts are becoming too expensive, how can the public sector attract the skilled security professionals it needs?<br /><br />One answer growing in popularity is to “get in the game” — literally. Across the world, various forms of cybercompetitions are growing in participation. Federal, state and local governments are working with nonprofits to encourage the development of cybersecurity skills through individual and team competitions.<br /><br />Or, to use a sports analogy, if you can’t compete in the free agency market for top talent, refresh your “farm team” and grow your own talent starting at an early age. <br /><br />All across the U.S., young people love to compete and not just in sports. There are many academic competitions, from university debate teams to the <a href="http://spellingbee.com/">National Spelling Bee</a> to high school <a href="http://wkar.org/programs/quizbusters">quiz bowls</a>.<br /><br />But how do cybercompetitions fit in? <br /><br />According to the U.S. Department of Homeland Security’s website on<a href="http://niccs.us-cert.gov/education/cyber-competitions">cybercareers and studies</a>: “DHS believes hands-on cybercompetitions are a valuable learning method for all students, regardless of level. Cybercompetitions are interactive, scenario-based events or exercises that help students develop and increase cybersecurity skills outside the traditional academic environment.”<br /><br />Typically teams of students work together to attack and defend against the opponent’s networks and computer systems. For example, in a cyber “capture the flag” game, players race to answer security challenges by seeking digital “flags” hidden on servers, in encrypted text or in applications. When a player or team submits a flag, they receive points for solving the challenge. The team with the highest cumulative score wins.<br /><br />There are plenty of cybercompetitions geared toward different skill and age levels. A few options:<br /><br />1. The Air Force Association <a href="http://www.uscyberpatriot.org/Pages/About/What-is-CyberPatriot.aspx">CyberPatriot</a> program has three main programs: the National Youth Cyber Defense Competition, AFA CyberCamps and the Elementary School Cyber Education Initiative.<br /><br />2. The annual <a href="http://www.nationalccdc.org/?tmpl=unsupported">National Collegiate Cyber Defense Competition</a>, which began in 2004, is like the March Madness of cybercompetitions. Colleges compete in state events, leading to regional and national competitions.<br /><br />3. The <a href="http://www.uscyberchallenge.org/">U.S. Cyber Challenge</a> consists of competitions, cybercamps and a virtual community to help the public and private sectors, as well as high schools and universities.<br /><br />4. SANS <a href="http://www.cyberaces.org/competitions/">Cyber Aces</a> offers state competitions as well as national opportunities for individuals to compete and learn. NetWars, also from the SANS Institute, is a cybergame based on the idea that the best way to learn is via hands-on experience with real-world scenarios.<br /><br />5. The <a href="http://www.nationalcyberleague.org/games.shtml">National Cyber League</a> provides ongoing virtual training for faculty and students to develop and validate cybersecurity skills using content aligned with individual and team games. This approach is used across diverse industry certifications, curricula, job roles and verticals.<br /><br />6. The <a href="http://www.merit.edu/cyberrange/">Michigan Cyber Range</a> offers many chances for public- and private-sector organizations to test team skills in Alphaville, a virtual small town. They can attack and defend the city hall, utilities, library and more in various scenarios.<br /><br />Cybercompetitions have become the new normal for learning and improving ethical hacking techniques and cyberdefense in a safe, fun, challenging environment. Whether you’re a middle school student just starting to learn cybersecurity concepts, an unemployed millennial who wants to switch careers, a midlevel security expert with a computer science degree or a government supervisor trying to attract the right employees, it may be time for you to join a cybercompetition.<br /><br />My advice? Get in the game.<br /><img border="0" src="http://media2.govtech.com/images/50*50/gt_412889_lohrmann.jpg" /><a href="http://www.govtech.com/authors/98566464.html">Dan Lohrmann </a> | Contributing Writer<br /><br />Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.<br /><br />Dan Lohrmann joined <a href="http://www.securitymentor.com/">Security Mentor, Inc.</a> in August 2014, and he currently serves as the CSO and Chief Strategist for this award-winning training company. Lohrmann is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. <a href="http://www.govtech.com/authors/MT-Author-GT-Dan-Lohrmann.html">Read Dan's full bio</a>. </div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-87973184898854113432015-07-16T10:55:00.000-07:002015-07-16T10:55:50.813-07:00IBM Open Badges<div style="background-color: white; border: 0px; color: #333333; font-family: Arial, sans-serif; font-size: 1.166em; line-height: 1.5em; outline: 0px; padding: 6px 0px; vertical-align: baseline;">
Working with our vendor, Acclaim, IBM is making available web-enabled digital versions of your credentials that you can display on social and professional networking sites, emails or personal web sites.</div>
<div style="background-color: white; border: 0px; color: #333333; font-family: Arial, sans-serif; font-size: 1.166em; line-height: 1.5em; outline: 0px; padding: 6px 0px; vertical-align: baseline;">
IBM's open badges provide an online representation of skills and achievements using the<a href="http://openbadges.org/" style="border: 0px; color: #745285; font-size: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" target="_blank">Mozilla Open Badges</a> standard. When someone clicks on your badge, they link to metadata describing your qualifications along with the process required to earn them. This additional level of information helps tell a more complete and compelling story of your achievements.</div>
<div style="background-color: white; border: 0px; color: #333333; font-family: Arial, sans-serif; font-size: 1.166em; line-height: 1.5em; outline: 0px; padding: 6px 0px; vertical-align: baseline;">
IBM is providing open badges at no charge to the badge earner to allow you to share and promote your IBM achievements across a broad range of online platforms such as LinkedIn, Twitter, Facebook, and your personal websites and blogs.</div>
<div style="background-color: white; border: 0px; color: #333333; font-family: Arial, sans-serif; font-size: 1.166em; line-height: 1.5em; outline: 0px; padding: 6px 0px; vertical-align: baseline;">
As part of this program, you will receive an open badge for your accomplishments along with the following:</div>
<ul class="ibm-bullet-list ibm-no-links" style="background-color: white; border: 0px; color: #333333; font-family: Arial, sans-serif; font-size: 1.166em; line-height: 1.5em; list-style: none; margin: 0px; outline: 0px; padding: 0px 0px 8px; vertical-align: baseline;">
<li style="background: url(http://1.www.s81c.com/i/v17/bullets/ibm_lg_bullet_grey_on.gif) 0px 13px no-repeat; border: 0px; clear: left; font-size: inherit; height: 22px; margin: 0px; outline: 0px; padding: 5px 0px 5px 11px; vertical-align: baseline;">A Web-enabled version of your credential</li>
<li style="background: url(http://1.www.s81c.com/i/v17/bullets/ibm_lg_bullet_grey_on.gif) 0px 13px no-repeat; border: 0px; clear: left; font-size: inherit; height: 22px; margin: 0px; outline: 0px; padding: 5px 0px 5px 11px; vertical-align: baseline;">Free access to a badge wallet for managing how you use the badges</li>
<li style="background: url(http://1.www.s81c.com/i/v17/bullets/ibm_lg_bullet_grey_on.gif) 0px 13px no-repeat; border: 0px; clear: left; font-size: inherit; height: 22px; margin: 0px; outline: 0px; padding: 5px 0px 5px 11px; vertical-align: baseline;">Secure and verifiable means of storing and publishing your credentials</li>
</ul>
<div>
<span style="color: #333333; font-family: Arial, sans-serif;"><span style="font-size: 18.6560001373291px; line-height: 27.984001159668px;"><a href="http://www-304.ibm.com/services/learning/ites.wss/zz/en?pageType=page&c=K023717Z98079G33">Learn More</a></span></span></div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-83743000241191866332015-07-16T09:27:00.002-07:002015-07-16T09:27:56.441-07:00BBC: Darkode hacking forum forced offlineBy Leo KelionTechnology desk editor <a href="http://www.bbc.com/news/technology-33542490">BBC</a><br /><br />15 July 2015 <br />From the section<a href="http://www.bbc.com/news/technology">Technology</a><br /><img height="262" src="http://ichef-1.bbci.co.uk/news/660/cpsprodpb/8D35/production/_84294163_18a88358-ca49-4034-8bb2-83e2f414f410.jpg" width="400" /><div>
<i>The Darkode forum, which was created about six years ago, can no longer be accessed</i><br /><b>Darkode - a notorious hacking forum used by Lizard Squad and other cybercriminals - has been shut down after an investigation carried out by authorities in 20 countries.</b><br />"We have dismantled a cyber-hornets' nest... which was believed by many, including the hackers themselves, to be impenetrable," <a href="https://www.fbi.gov/pittsburgh/press-releases/2015/major-computer-hacking-forum-dismantled">said one of the US state attorneys involved</a>.<br /><br />Twenty-eight people have been arrested.<br /><br />They include a 26-year-old man from Coventry, England.<br /><br />In addition, <a href="http://www.nationalcrimeagency.gov.uk/news/654-international-operation-shuts-down-online-hacking-forum">the UK's National Crime Agency said an address</a> in Paisley, Scotland, had been searched and material removed for examination. It said that five other suspected members of the site had previously been arrested.<br /><br />The FBI added that dozens of other people linked to the site had been charged or had their property searched as part of the inquiry.<br /></div>
<div>
<b>Restricted access</b><br />Darkode's members allegedly used the site to trade and to share hacking tools and information, including details of zero-day attacks - techniques that exploited flaws in products that neither their creators nor the wider security industry were aware of, and thus could not be protected against.<br /><br />This information was password-protected.<br /><br />"Only those proposed for membership by an existing user could join, but not until they posted a resume of the skills and achievements that could contribute to the criminal community," explained the NCA.<br /><br />"There was a hierarchical membership structure, and the status of users determined who they could communicate with, and their access to the commodities and services on offer."<br /><br />Although the site was not accessible to the general public, it was profiled<a href="http://krebsonsecurity.com/?s=darkode&x=0&y=0">extensively by the security blogger Brian Krebs</a>, who posted several screenshots on his site.</div>
<div>
<br /></div>
<div>
<img height="225" src="http://ichef-1.bbci.co.uk/news/624/cpsprodpb/DB55/production/_84294165_a1a66e4a-3dd6-4031-9512-eb63e3a39d9c.jpg" width="400" /></div>
<div>
<i>Botnets - networks of hijacked computers used to mount co-ordinated attacks - were promoted on the site</i><br />"Most of the cybercrime forums are in Russian or some other language that's not English, but this was an English-language forum," he told the BBC.<br /><br />"And it was a sort of meeting ground for cybercriminals from different nationalities and languages.<br /><br />"A fairly significant number of people were selling botnet services there, and there were also services for deploying malware and phishing."<br /><br />He added that the forum's visitors included members of Lizard Squad - a group of hackers which has carried out high-profile attacks on Sony, Microsoft and others.<br /><br />"The guy that was most recently the admin of the forum used the nickname Sp3c," Mr Krebs recalled.<br /><br />"He was a leading member of the Lizard Squad. What's interesting is that you don't see his name in the lists of those that were apprehended or charged as part of this.<br /><br />"I don't really know what that means, but there was a definite connection between the Lizard Squad and this forum, at least in the last year or so."<br /><br />The FBI said that Operation Shrouded Horizon had indicated up to 300 people had used the forum.<br /><br />"During the investigation, the bureau focused primarily on the Darkode members responsible for developing, distributing, facilitating and supporting the most egregious and complex cybercriminal schemes targeting victims and financial systems," it said.<br /><br />It added that its counterparts in Australia, Bosnia, Brazil, Israel, Colombia and Nigeria were among those involved in the international crackdown, and that efforts to trace other suspects were "ongoing".</div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-90413542977998223602015-07-14T14:37:00.003-07:002015-07-14T14:39:22.586-07:00New eBooks from OP-TEC<img border="0" height="76" src="https://lh6.googleusercontent.com/proxy/AhOsHsGrWM_iqTGS6DSjI4hesCFC9VU7rtoGx7Akanq3kZfBEpaoAs_sWTm3qd8CG2n3lehHNK_xL9CyQ1hvzsF206bXr_A6ZsggU05E7pU" width="400" /> <br />
<br />
<b>NEW eBooks From OP-TEC! </b><br />
<br />
<img border="0" height="640" src="https://lh6.googleusercontent.com/proxy/TTjwiARj1pDAEKms6uW9gHEb76Zj0QOfJRnrHWIFu1enf9VeO88vhJZ-JQm8Pd2D3g5bA4TpIVjbgYpYDuYNEhy-VJzeV_TAYcyeGbBG6COmKvtKo2t6TOsDQuupfNpURQ" width="494" /> <br />
<br />
OP-TEC National Center for Optics and Photonics Education<br />
<div>
316 Kelly Drive<br />
Waco, Texas 76710<br />
254-751-9000 </div>
<!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fih.constantcontact.com%2Ffs196%2F1101946745829%2Fimg%2F55.jpg&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://lh6.googleusercontent.com/proxy/AhOsHsGrWM_iqTGS6DSjI4hesCFC9VU7rtoGx7Akanq3kZfBEpaoAs_sWTm3qd8CG2n3lehHNK_xL9CyQ1hvzsF206bXr_A6ZsggU05E7pU" --><!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Ffiles.ctctcdn.com%2F5e3f4219001%2F178359bc-ddb1-4366-a0fd-13c2d633856d.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://lh6.googleusercontent.com/proxy/TTjwiARj1pDAEKms6uW9gHEb76Zj0QOfJRnrHWIFu1enf9VeO88vhJZ-JQm8Pd2D3g5bA4TpIVjbgYpYDuYNEhy-VJzeV_TAYcyeGbBG6COmKvtKo2t6TOsDQuupfNpURQ" -->James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-85984474285759108402015-07-10T16:24:00.000-07:002015-07-10T16:24:10.247-07:00BBC: Huge data breach prompts resignation of top US official3 hours ago <a href="http://www.bbc.com/news/world-us-canada-33481285">BBC</a><br />From the section<a href="http://www.bbc.com/news/world/us_and_canada">US & Canada</a><br /><img height="224" src="http://ichef-1.bbci.co.uk/news/660/cpsprodpb/13F74/production/_84208718_173c8e36-4142-4bd2-8704-61774de9d79b.jpg" width="400" /><br /><br /><b>The director of the US Office of Personnel Management (OPM) has resigned after a massive data breach involving more than 20 million people.</b><br />Katherine Archuleta said she would step down on Friday to help the department "move beyond the current challenges".<br /><br />Authorities suspect that Chinese-based hackers targeted the computer systems of the OPM, which acts as the personnel office of the federal government.<br /><br />Initially the OPM said four million workers were affected by the breach.<br /><br />However, the department disclosed on Thursday that the data of more than 20 million people, including current and former employees, may have been compromised.<br /><br />Authorities in Beijing have publicly denied any involvement.<br /><br />Ms Archuleta resignation comes a day after Democrats and Republicans in Congress called for her to step aside as the scope of the data breach expanded significantly.<br /><br />Among the data targeted were forms used to vet potential employees of federal agencies including as the CIA and branches of the military.<div>
<br /><div>
<img height="225" src="http://ichef.bbci.co.uk/news/624/cpsprodpb/DBE0/production/_84188265_hi027557614.jpg" width="400" /></div>
<div>
<i>OPM serves as the human resource department for the US government</i><br />The stolen data includes health and financial information, criminal records, and the names and addresses of government employees and their relatives.<br /><br />Experts are concerned that the sensitive information could be used to blackmail US agents.<img src="http://ichef.bbci.co.uk/news/624/media/images/76020000/jpg/_76020974_line976.jpg" /><br />What was stolen?<br />social security numbers<br />residency and educational history<br />employment history<br />information about immediate family and other personal and business acquaintances<br />health, criminal and financial history<br />findings from interviews conducted by background investigators<br />fingerprints<br />usernames and passwords that background investigation applicants used<br /><br />Source: <a href="https://www.opm.gov/news/releases/2015/07/opm-announces-steps-to-protect-federal-workers-and-others-from-cyber-threats/">OPM news release</a><img src="http://ichef.bbci.co.uk/news/624/media/images/76020000/jpg/_76020974_line976.jpg" /><br /><br />Last month, US intelligence chief James Clapper said China was the "leading suspect" in the massive data breaches.<br /><br />His comments came after three days of high-level talks in which China and the US agreed to a "code of conduct" on cyber security issues.<br /><br />US Democratic presidential hopeful Hillary Clinton said China was "trying to hack into everything that doesn't move in America".<br /><br />But China has dismissed claims of involvement as "irresponsible and unscientific".</div>
</div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-85915413128779348682015-07-10T16:21:00.000-07:002015-07-10T16:21:04.991-07:00BBC: Hackers 'stole data of millions of US government workers'10 July 2015 <a href="http://www.bbc.com/news/world-us-canada-33472585">BBC</a><br />From the section<a href="http://www.bbc.com/news/world/us_and_canada">US & Canada</a><br /><img height="224" src="http://ichef.bbci.co.uk/news/660/cpsprodpb/DBE0/production/_84188265_hi027557614.jpg" width="400" /><div>
<i>OPM serves as the human resource department for the US government</i><br /><b>Hackers that breached US government databases stole the personal information of at least 21.5 million people, officials said on Thursday.</b><br />Those affected include government job applicants, federal contractors, and over a million of their partners, the Office of Personnel Management said.<br /><br />The figure is more than five times higher than the number of people that were feared to have been affected.<br /><br />The data breach, which came to light in April, was widely blamed on China.<br /><br />Authorities in Beijing have publicly denied any involvement.<br /><br />The breach prompted a series of hearings in Congress and widespread criticism of the state of US cyber defences.<br /><br />Politicians from both parties demanded OPM boss Katherine Archuleta be fired.<br /><br />House of Representatives Speaker John Boehner, a Republican, said President Barack Obama "must take a strong stand against incompetence in his administration and instill new leadership at OPM".<br /><br />Last month, officials said personnel records of 4.2 million current and former federal government employees had been stolen in an incident.<br /></div>
<div>
<b>'No misuse yet'</b><br />On Thursday, <a href="https://www.opm.gov/news/releases/2015/07/opm-announces-steps-to-protect-federal-workers-and-others-from-cyber-threats/">OPM said</a> that while investigating that breach they discovered additional information had also been compromised, including the social security numbers of 21.5 million individuals.<br /><br />The stolen data also includes health and financial information, criminal records, and the names and addresses of government employees and their relatives.<br /><br />Those affected include 19.7 million people who underwent background checks and 1.8 million others, mostly the partners of job applicants.</div>
<div>
<br /></div>
<div>
<img height="225" src="http://ichef-1.bbci.co.uk/news/624/cpsprodpb/B71E/production/_84187864_hi027813371.jpg" width="400" /><br /><i>OPM serves as the human resource department for the US government. The agency issues security clearances and compiles records of all federal government employees.</i><br />The agency said that it had "no information at this time to suggest any misuse or further dissemination of the information that was stolen from OPM's systems."<br /><br />But it said that for anyone who underwent a background investigation in 2000 or afterwards "it is highly likely that the individual is impacted by this cyber breach."<br /><br />Last month, US intelligence chief James Clapper said China was the "leading suspect" in the massive data breaches.<br /><br />His comments came after three days of high-level talks in which China and the US agreed to a "code of conduct" on cyber security issues.<br /><br />Earlier this week, US Democratic presidential hopeful Hillary Clinton said China was "trying to hack into everything that doesn't move in America".<br /><br />China has dismissed claims of involvement as "irresponsible and unscientific".</div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-88769548619178631752015-07-10T08:54:00.001-07:002015-07-10T08:54:30.605-07:00CCC Technology for Student Success News <br /><img border="0" src="http://ih.constantcontact.com/fs146/1117159276976/img/39.gif" /><div>
<br /></div>
<div>
Welcome! <br /><br />Welcome to the July issue of CCC Technology for Student Success News featuring updates on the latest progress of the Common Assessment Initiative (CAI), Online Education Initiative (OEI) and Education Planning Initiative (EPI). <br /><br /><b>CCCAssess To Be Ready When Compass Exits </b><br /><br /><img border="0" src="http://files.ctctcdn.com/0b1c1eb1401/89f48ea9-8c17-49fa-a814-96780e5e2ce5.jpg" /></div>
<div>
<br /></div>
<div>
With ACT planning to discontinue its Compass assessment test in fall of 2016, the California Community Colleges (CCC) Common Assessment Initiative (CAI) is trying to identify how colleges are using the test in order to mitigate the impact. <br /><a href="http://r20.rs6.net/tn.jsp?f=001BayTrYcqSKx24W3U6-APb1j-tY9ejqPelC9Bid9EFmPDtfIT8OqrtlcD8FELqDV7O55Riad5oOSQsvm7pNNq6tEkHDehV8nNgG7ltlyNFmcxPZzmRHhjAHx8LSayBJI0L-ehs2PPwlqjsJwptr8YlaTY47yfck7bvOAJqtAinzH79rPju4yr9FITfQXxoJ7W8TRrM96iINHxq6Su2lxOBgtgGmWFEepNho8l6L1sihU1A55QzgFAJY_4OfaKmYpdIBXjEd4TuA4=&c=ZegJdR8L0qsJrkOqWmyAFkFd0GkEuxhqhEd6fWjTscm15NY_Rb6VJg==&ch=utiVKqv9kT0iAbHfOrHAkmhAr3gyLrBlxiMTkiOHXp2vFVM5Fx7BpA==">Read on...</a> <br /><br /><b>Colleges Begin Canvas Adoption Process </b><br /><img border="0" src="http://files.ctctcdn.com/0b1c1eb1401/84585710-34a1-4201-b604-2cb633414396.jpg" /></div>
<div>
The signing of a contract with Instructure for the use of Canvas as a common course management system (CCMS) marks a key milestone for the California Community Colleges (CCC) in its journey to create statewide excellence in online learning. <br /><a href="http://r20.rs6.net/tn.jsp?f=001BayTrYcqSKx24W3U6-APb1j-tY9ejqPelC9Bid9EFmPDtfIT8OqrtlcD8FELqDV7MMgpqdmcq45wS5JTGtNSMWCivpOWTJ1qginyIK2C4-1zs4-YG_97OeOJdmmmaeoHYiE4wd_r5EACBR41NN_X0cVmTJj1UvFUV29BcIkYvII3Wt28lqeerJAOjJZlXmVMqgoAwfUnXhFJxl0lv01MndX-BZICEhcu1t4oBVSKErgPqgratv9WiqspYkR_na1T&c=ZegJdR8L0qsJrkOqWmyAFkFd0GkEuxhqhEd6fWjTscm15NY_Rb6VJg==&ch=utiVKqv9kT0iAbHfOrHAkmhAr3gyLrBlxiMTkiOHXp2vFVM5Fx7BpA==">Read on...</a> <img border="0" src="https://imgssl.constantcontact.com/letters/images/spacer.gif" /> <br /><br /><b>Structured Student Pathways Taking Shape </b><br /><img border="0" src="http://files.ctctcdn.com/0b1c1eb1401/85530417-430b-4e72-8a77-54aad12666d4.jpg" /></div>
<div>
The California Community Colleges (CCC) Education Planning Initiative (EPI) continues to move forward with the numerous development and pilot projects the team is currently working on through the hot summer months. <br /> <a href="http://r20.rs6.net/tn.jsp?f=001BayTrYcqSKx24W3U6-APb1j-tY9ejqPelC9Bid9EFmPDtfIT8OqrtlcD8FELqDV7-kRKkVX9-hLgql51kvrZyYDa7-kjOQA8zL9K5Zl7OytSNmRYgVLm8WCj51XYFIUdKsz8OBzXMaijMZqN28gm4zgSLGgnIFMlPz5qFrnuK949LpcM2u08Mmq9KJgJUTjhoDKp7O8OYfSMBeguIdYA4vXj_-ZgYjxslofh5onj1sLSiPHcBOvWyOrBxIyKsKgb&c=ZegJdR8L0qsJrkOqWmyAFkFd0GkEuxhqhEd6fWjTscm15NY_Rb6VJg==&ch=utiVKqv9kT0iAbHfOrHAkmhAr3gyLrBlxiMTkiOHXp2vFVM5Fx7BpA==">Read on...</a> </div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0tag:blogger.com,1999:blog-5768616876286768328.post-46308470431028246282015-07-08T11:05:00.000-07:002015-07-08T11:05:28.761-07:00<img src="http://i.omkt.co/Files/402/29553C/1153E/fa9b2b8d20574e52ad399782defc6d01/0/Screen+Shot+2015-06-28+at+6.16.59+PM.png" /> <br /><br /><b>More trainings have been added to the TTT schedule: </b><br /><br />IT Essentials Train the Trainer <br />July 13th <br /><br />Essentials 1 & 2: Firewall Installation, Configuration and Management <br />July 27th <br /><br />IT Essentials Train the Trainer <br />August 3rd <br /><br />SCADA <br />August 3rd <br /><br />Netlabs+ User Community Workshop <br />August 6th <br /><br />(ISC) CISSP Course <br />August 10th <br /><br />EMC's Coud Infastructure & Services v2 (CIS) <br />August 10th <br /><br />Essentials 1 & 2: Firewall Installation, Configuration and Management <br />August 24th <br /><br />(ISC) SSCP Course <br />September 7th <br /><br />EMC's Information Storage & Management v2 (ISM) <br />September 14th <br /><br />Seats are limited so register today! <br /><br /><a href="http://www.cssia.org/cssia-training.cfm"><img border="0" height="116" src="http://i.omkt.co/Files/402/29553C/10DE9/ededa76b1322499e8147959de3557de5/0/Gold+Click+Here.png" width="320" /></a><div>
<a href="http://www.cssia.org/cssia-training.cfm"> http://www.cssia.org/cssia-training.cfm</a><br /><br />For questions regarding trainings, <br />contact Lynn Dohm at <a href="mailto:lynn.dohm@morainevalley.edu">lynn.dohm@morainevalley.edu</a>. <br /><a href="http://www.cssia.org/">www.cssia.org</a> <br /><br /></div>
James Joneshttp://www.blogger.com/profile/08022827076011641683noreply@blogger.com0