Social Engineering: New Cyber Manipulation in the Digital Age

October 27, 2023
When we think of hackers, we tend to think of technological prodigies who use advanced programming to complete rogue missions of espionage, disruption, and theft. And while that view is often correct, the rise of social engineering has ushered in a new wave of cyberattacks that are technologically sophisticated but intentionally benign in their execution. Social engineering seeks to manipulate the most vulnerable part of any cybersecurity plan—people. It’s more than a simple con; it's an intricate and pervasive threat that's shaping the digital landscape in new and unexpected ways. 
Read More

NCAE Northeast Regional Hub Hosts First Cybersecurity Townhall



The NCAE Northeast Regional Hub of the National Center of Academic Excellence (NCAE) held a successful first regional cybersecurity town hall meeting on August 24, 2023, which brought together cybersecurity experts, educators, students,

Read More

Accepted Students

The Industries Most Vulnerable to Cyberattacks

October 23, 2023
Cyberattacks are a serious threat to nearly every industry, but some are at greater risk because they manage high-value data, such as personal information, financial records, or intellectual property. Cybercriminals look to steal and sell this data on the dark web or use it for fraud, extortion, or sabotage. 
Read More

Capitol Leadership Presenting at International Cybersecurity Forum Oct 25



Capitol Technology University President Dr Bradford Sims and CWC Executive Director Dr Diane Janosek will be participating in the International Cybersecurity Forum North America (ICF) on Wed, Oct 25 in Montreal, Canada.

Read More

Zero Day Vulnerabilities and What They Mean

October 20, 2023
For cybersecurity professionals, staying a step ahead of attackers is a significant challenge. One of the most powerful tools in cybercriminals’ arsenal is exploiting zero-day vulnerabilities, which are concealed from the very developers who create and are responsible for defending against them. When these vulnerabilities are exploited by attackers, user data, company secrets, and government intelligence can be placed at significant risk.
Read More
Liam Williams

Liam Williams

Adjunct Professor

Clarity Cyber, Engineering Technologies Read Bio

Niche Direct Admissions