Blog

PLEASE CLICK ON ANY OF THE TITLES BELOW TO READ MORE.

  • Meet Meredith Schorr, a junior from DePaul School of Hospitality, who served an important role this past summer with the Foundation.

  • NCM acquires wireless communications receiver (WJ-8692) from DRS in August 2018.

  • Robert Gabrick explores the National Cryptologic Museum in his article, "Motel of Secrets," for the August 2018 issue of "America in WWII" magazine.

  • This article explores the threat posed by what we now refer to as the Internet of Things (IoT). Our smart homes and cities may be more efficient, but at what risk? What measures can be taken to increase our safety while enjoying the benefits of the IoT?

  • The NCM has acquired a new aircraft! A U.S. Army RC-12D Guardrail reconnaissance aircraft is the latest addition for the future National Vigilance Park.

  • Current cybersecurity news briefs include: Cyber Threats Against Pacemakers; Cellphone Vulnerabilities Reported for All Major U.S. Carriers; Global Health Records at Risk; and more.

  • Often referred to as the world's most beautiful woman, Hollywood actress Hedy Lamarr was an ingenious inventor whose pioneering work helped revolutionize modern communication. Check out the film, "Bombshell: The Hedy Lamarr Story" to learn all about her life.

  • Recent Cybersecurity News Briefs - including DHS provides details on Russian intrusion into U.S. grid; Prisoners pad their accounts with stolen credit obtained via hacking; Mimecast report on the state of corporate email security; Supply chains pose biggest corporate threat; and more.

  • Need some Summer reading? Check out "The Cypher Bureau" by Eilidh McGinness - a work of historical fiction that puts the spotlight on The Polish Cypher Bureau's early successes at breaking the Enigma, prior to sharing their progress with Britain and France.

  • Cybersecurity News Stories (23 July 2018) including DoJ Releases First Cyber Digital Task Force Report; Increase in Cyber Incidents in 2018; Malware Uses Stolen Digital Certificates; Surprising Practices of Information Security Professionals; and more.