UMUC Launches Guide to Cyber Experts and Blog to Address Today’s Threat Landscape

ADELPHI, Md., Nov. 10, 2016 – In an effort to address growing government and private sector interest in cybersecurity technology, policy, management and careers, University of Maryland University College (UMUC) has launched its Guide to Cyber Experts and announces the re-launch of its Cyber Connections blog focusing on news, insights, opinion and advice related to all things “cyber.”

The Guide to Cyber Experts is the go-to resource for members of the media covering all facets of cybersecurity. It contains biographies of UMUC faculty experts and their specialized areas of interest. Guide users can find an expert on a wide array of cybersecurity-related topics, view more detailed information about each expert and schedule interviews.

UMUC experts focus on a range of areas, including:

  • Cybersecurity in healthcare and education
  • Legal and policy aspects of cybersecurity
  • Cybersecurity job landscape and careers
  • Cybersecurity and critical infrastructure
  • Computer hacking
  • Internet of Things (IoT)
  • Computer and network forensics
  • Secure software engineering
  • Current threatscape
  • Cybersecurity innovation, governance and digital strategy

Cyber Connections, UMUC’s re-launched and refocused blog addressing current and top-of-mind issues, is aimed at cybersecurity professionals, students, members of the media and anyone with an interest in following news, insights and opinions about cybersecurity from UMUC faculty experts, partners, students and staff.

“As the number of cyber threats proliferate, and the demand for qualified cyber professionals grows, it has become more important than ever to share expertise and best practices so that we can address the challenges of the current threat landscape,” said Emma Garrison-Alexander, vice dean Cybersecurity Graduate programs at UMUC. “Our Guide to Cyber Experts and Cyber Connections blog demonstrate our commitment to leading the effort to understand the field, and to minimize and eliminate the risk associated with these threats.”