Homeowners and companies require increased cybersecurity to protect their devices and data. Experts differ in regard to what form that security will take.
By J. Thompson
Online Learning Tips Contributor
Black Handâ€™s assassination of Archduke Ferdinand and his wife triggered World War I. Pearl Harbor thrust the U.S. from isolationism into World War II. The Gulf of Tonkin catalyzed U.S. military intervention in Vietnam. Is it possible that the Rogen-Franco hackneyed Hollywood comedy The Interview (in the vein of 1985â€™s Chase-Akroyd, Spies Like Us) will become the flashpoint for The Great Cyberwar in the chronicles of history?x
Interview with Dr. Clay Wilson
Program Director, Cybersecurity at American Public University
Films have a tendency to stretch the imagination beyond what is scientifically and physically possible. They are reliant on the suspension of disbelief to build upon the storyline and engross the viewer. One such exaggerated instance is the electromagnetic pulse. For the average viewer the misperceptions around electromagnetic pulse implications do not directly impact them, but to those studying cybersecurity it's extremely important to get educated on its real implications.