{"id":403,"date":"2023-08-31T19:17:22","date_gmt":"2023-08-31T19:17:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/?p=403"},"modified":"2023-08-31T19:22:45","modified_gmt":"2023-08-31T19:22:45","slug":"cybersecurity-through-pictures-and-video","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/2023\/08\/31\/cybersecurity-through-pictures-and-video\/","title":{"rendered":"Cybersecurity Through Pictures (And Video)"},"content":{"rendered":"\n<p>Below are 5 pictures that I believe not only illustrate my passion for Cybersecurity, but also the symbiotic relationship between society and technology as well as our need to protect it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/Advanced-Cybersecurity-Program-Overview_0.jpg\" alt=\"\" class=\"wp-image-404\" width=\"690\" height=\"388\" srcset=\"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/Advanced-Cybersecurity-Program-Overview_0.jpg 720w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/Advanced-Cybersecurity-Program-Overview_0-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/Advanced-Cybersecurity-Program-Overview_0-533x300.jpg 533w\" sizes=\"(max-width: 690px) 100vw, 690px\" \/><\/figure>\n\n\n\n<p>Obtained from <a href=\"https:\/\/online.stanford.edu\/programs\/advanced-cybersecurity-program\">https:\/\/online.stanford.edu\/programs\/advanced-cybersecurity-program<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"690\" height=\"400\" src=\"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/kkGettyImages-163751742.jpg\" alt=\"\" class=\"wp-image-405\" srcset=\"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/kkGettyImages-163751742.jpg 690w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/kkGettyImages-163751742-300x174.jpg 300w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/kkGettyImages-163751742-518x300.jpg 518w\" sizes=\"(max-width: 690px) 100vw, 690px\" \/><\/figure>\n\n\n\n<p>Obtained from <a href=\"https:\/\/healthitsecurity.com\/features\/top-mid-year-healthcare-cybersecurity-trends\">https:\/\/healthitsecurity.com\/features\/top-mid-year-healthcare-cybersecurity-trends<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/public-cybersecurity-companies-1024x538.png\" alt=\"\" class=\"wp-image-406\" width=\"690\" height=\"362\" srcset=\"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/public-cybersecurity-companies-1024x538.png 1024w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/public-cybersecurity-companies-300x158.png 300w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/public-cybersecurity-companies-768x403.png 768w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/public-cybersecurity-companies-571x300.png 571w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/public-cybersecurity-companies.png 1200w\" sizes=\"(max-width: 690px) 100vw, 690px\" \/><\/figure>\n\n\n\n<p>Obtained from <a href=\"https:\/\/builtin.com\/cybersecurity\/public-cyber-security-companies\">https:\/\/builtin.com\/cybersecurity\/public-cyber-security-companies<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/SEC-0423-News1-Feat-Slide1-1170x658-1-1024x576.jpg\" alt=\"\" class=\"wp-image-407\" width=\"691\" height=\"388\" srcset=\"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/SEC-0423-News1-Feat-Slide1-1170x658-1-1024x576.jpg 1024w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/SEC-0423-News1-Feat-Slide1-1170x658-1-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/SEC-0423-News1-Feat-Slide1-1170x658-1-768x432.jpg 768w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/SEC-0423-News1-Feat-Slide1-1170x658-1-533x300.jpg 533w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/SEC-0423-News1-Feat-Slide1-1170x658-1.jpg 1170w\" sizes=\"(max-width: 691px) 100vw, 691px\" \/><\/figure>\n\n\n\n<p>Obtained from <a href=\"https:\/\/www.securitymagazine.com\/articles\/99176-gaps-in-agency-cybersecurity-measures\">https:\/\/www.securitymagazine.com\/articles\/99176-gaps-in-agency-cybersecurity-measures<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/Elazari_hacker_square-1024x1010-1.jpg\" alt=\"\" class=\"wp-image-408\" width=\"691\" height=\"681\" srcset=\"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/Elazari_hacker_square-1024x1010-1.jpg 1024w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/Elazari_hacker_square-1024x1010-1-300x296.jpg 300w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/Elazari_hacker_square-1024x1010-1-768x758.jpg 768w, https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-content\/uploads\/sites\/32493\/2023\/08\/Elazari_hacker_square-1024x1010-1-304x300.jpg 304w\" sizes=\"(max-width: 691px) 100vw, 691px\" \/><\/figure>\n\n\n\n<p>Obtained from <a href=\"https:\/\/www.strausscenter.org\/events\/hacker-culture-around-the-world\/\">https:\/\/www.strausscenter.org\/events\/hacker-culture-around-the-world\/<\/a><\/p>\n\n\n\n<p>In addition to the above pictures, the below video perfectly illustrates the need for continuing advancements in Cybersecurity, and reveal it as a continuously evolving threat.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Demand for cyber security is strong as AI creates new vulnerabilities, says Tenable CEO Amit Yoran\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/GyOfUBmJ0lA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Below are 5 pictures that I believe not only illustrate my passion for Cybersecurity, but also the symbiotic relationship between society and technology as well as our need to protect it. Obtained from https:\/\/online.stanford.edu\/programs\/advanced-cybersecurity-program Obtained from https:\/\/healthitsecurity.com\/features\/top-mid-year-healthcare-cybersecurity-trends Obtained from https:\/\/builtin.com\/cybersecurity\/public-cyber-security-companies Obtained from https:\/\/www.securitymagazine.com\/articles\/99176-gaps-in-agency-cybersecurity-measures Obtained from https:\/\/www.strausscenter.org\/events\/hacker-culture-around-the-world\/ In addition to the above pictures, the below video&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jordanthernaez\/2023\/08\/31\/cybersecurity-through-pictures-and-video\/\">Read More<\/a><\/div>\n","protected":false},"author":26166,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-json\/wp\/v2\/posts\/403"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-json\/wp\/v2\/users\/26166"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-json\/wp\/v2\/comments?post=403"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-json\/wp\/v2\/posts\/403\/revisions"}],"predecessor-version":[{"id":411,"href":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-json\/wp\/v2\/posts\/403\/revisions\/411"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-json\/wp\/v2\/media?parent=403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-json\/wp\/v2\/categories?post=403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jordanthernaez\/wp-json\/wp\/v2\/tags?post=403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}