Skip to Main Content

Capitology Blog

Cybersecurity explained in five functions

The National Institute of Standards and Technology (NIST) defines “Five Functions of Cybersecurity” that should be used to manage cyber risks. Take a look and see what cybersecurity jobs are really about.

Report: training, education needed to address industrial cybersecurity threat

Industries across the United States, as well as power plants and other critical infrastructure, face a burgeoning security risk as more and more IP-enabled devices and features are incorporated into their operations.

Machine Learning: Decision Trees Finalized

Our goal in this series is to help demystify the topic and break down the processes that make it possible not only for humans to teach machines – but also for machines to teach themselves.

Manufacturing in the 21st century: the role of mechatronics

Many analysts believe the role of mechatronics is to tackle manufacturing’s skill shortage while ensuring workers – and their managers – have the skills needed for the 21st-century workplace.

From Rosie to Roomba, autonomous robots bring sci-fi to life

In 1869, Jules Verne wrote Twenty Thousand Leagues Under the Sea, which anticipated (thirty years early) the use of submarines. By 1930, thanks to the invention of the airplane, it became possible to travel across the globe within a short time span – faster, even, than the journey described in Verne’s Around the World in Eighty Days, published in 1873.

Retrofitting a plant for the cyber age can bring cybersecurity risks

What are some common cybersecurity risks in the manufacturing sector which come about when retrofitting a plant for the cyber age?

Students and their phones: sometimes appearances can deceive

Look -- our students are busy staring at their phones again. We're at NASA about to launch a rocket and they're fiddling with those devices. Typical Post-Millennials, am I right?

Airmen: earn a cybersecurity degree at Capitol Tech through AU-ABC

Smothers: human factor essential to protecting critical infrastructure

Cyberattacks against SCADA systems – used to control industrial processes as well as much of our critical infrastructure – are a top

Machine Learning: Algorithm Overview

By Jason M. Pittman, D.Sc.