Rohit Chadha

donrefeature

Calyam leading efforts to establish zero trust cybersecurity approach for battlefield communications

A Mizzou Engineer is leading efforts to establish a new cybersecurity approach to better protect classified information and communications on the battlefield. Prasad Calyam — Greg L. Gilliom Professor of Cyber Security and director of the Mizzou Center for Cyber Education, Research and Infrastructure — is leading the project as Principal Investigator of a National Security Agency grant.

Members of the Cybersecurity Industrial Advisory Board

Mizzou Cybersecurity Center Board Provides Industry Expertise

A new Mizzou Cybersecurity Center Industrial Advisory Board (IAB) is helping the college enhance curriculum and research to best meet emerging needs within cybersecurity fields.

Illustration with logos for Mizzou Engineering and Amrita Vishwa Vidyapeetham

Partnership with Amrita Kicks off with International Symposium

Mizzou Engineering has formed a partnership with a top-ranked university in India to foster collaboration among researchers and students. The partnership between Mizzou and Amrita Vishwa Vidyapeetham aims to promote cooperation through joint research and publications, international initiatives, training programs and student exchanges.

featureiab

Mizzou Cybersecurity Center Forms New Industrial Advisory Board

Mizzou Cybersecurity Center directors have assembled an all-star team of industry professionals to guide the future of research and education around cybersecurity strategies. The new Mizzou Cybersecurity Industrial Advisory Board (IAB) will help plan center activities, provide input into research and educational curricula and consider potential strategic partnerships between the center and their respective organizations.

A pair of glasses sits in front of a computer screen.

Mizzou Engineering’s Chadha protecting your data, identity

While hacking databases is the main way for interested parties to gain users’ personal information, it’s not the only possibility. Intrepid attackers can use perfectly benign means to do so. How? By using readily available aggregate data — for example: census data, medical data focused on how many people in an area suffer from a specific illness, consumer trend data, etc. — and using it to focus on specific individuals.