Also In This Section
  • Topics

  • Recent Posts

  • Category: Cybersecurity

    MEDC Cyber and Mobility Division Visits Michigan Tech

    MEDC Logo Michigan Tech’s ICC Center for Cybersecurity and the MTEC SmartZone hosted members of the Michigan Economic Development Corporation’s (MEDC’s) Cyber and Mobility division in Houghton, MI, on December 2, 2019. The group’s visit included presentations by several Michigan Tech faculty who are conducting research in the cyber and mobility space, strategic economic development…


    Yooper Lights: Blue Marble Security Enterprise mentors 7th graders on an eCYBERMISSION

    Students attending Lake Linden-Hubbell schools who live within one mile of their school are not eligible to take the school bus. Many walk to school, often in the dark, early morning hours. The same is true for students in another nearby school district, Calumet-Laurium-Keweenaw. The Yooper Lights eCybermission team, L to R: Olivia Shank, Rebecca…


    Ford Motor Meet and Greet, Weds., Sept. 4, 2-5 pm

    Ford Motor Company will host a Meet &  Greet on Wednesday September 4, 2019 , 2:00 PM—5:00 PM, in the Rekhi Hall 2nd Floor Lounge. Computer scientists from Ford Motor Company will be on hand to discuss CS and careers at Ford. All Department of Computer Science students, as well as other interested students, are invited. Complimentary food and beverages…


    GenCyber Camp for Teachers Garners Local Media Coverage

    Michigan Tech hosted two week-long GenCyber camps this summer. The first, held June 17–21, 2019, hosted 30 local middle/high school students. The second camp, August 12–16, 2019, hosted 21 local K-12 teachers. Camp participants gained cybersecurity knowledge, understood correct and safe online behavior, and explored ways to deliver cybersecurity content in K-12 curricula. A story…


    Inspiring the Next Generation of Cyber Stars

    By Karen S. Johnson, ICC Communications Director We live in a world where pretty much everything and everybody – individuals, companies, governments, critical infrastructure – are increasingly dependent on connected systems, networks and devices. And, as newspaper headlines reveal, those systems may be insecure and vulnerable to hackers. “Nowadays, everybody is using computers, and more…