<node id="596536">
  <nid>596536</nid>
  <type>news</type>
  <uid>
    <user id="27948"><![CDATA[27948]]></user>
  </uid>
  <created>1506523797</created>
  <changed>1506632649</changed>
  <title><![CDATA[Tackling Cybersecurity: White Hats, Black Hats, and Grey Matter]]></title>
  <body><![CDATA[<p>Connected technology has opened the door for criminals and foreign governments to launch&nbsp;cyberattacks&nbsp;with increasing scale and impact.&nbsp;</p>

<p>Yet,&nbsp;secure internet and its applications are now essential to almost every aspect of our daily lives.&nbsp;</p>

<p>Today, America&rsquo;s national defense, economic prosperity, and individual freedoms depend upon&nbsp;cybersecurity. &nbsp;</p>

<p>As the storm of demand for&nbsp;cybersecurity&nbsp;solutions and talent grows, Georgia Institute of Technology researchers, faculty members, and students are tackling&nbsp;cybersecurity&nbsp;from multiple angles.</p>

<h5>Read the Full Story:</h5>

<p><a href="http://www.news.gatech.edu/features/white-hats-black-hats-and-grey-matter-tackling-cybersecurity">White Hats, Black Hats, Grey Matter: Tackling Cybersecurity</a></p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2017-09-25T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[In the realm of cybersecurity, white hats are good-guy defenders and black hats are the adversary. Yet it takes a combination of both to really put grey matter to work and solve the most vexing challenge of our time: protecting connected data.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="596534">
            <nid>596534</nid>
            <type>image</type>
            <title><![CDATA[White hats, Blacks hats, grey matter thumbnail]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>227357</fid>
                  <filename><![CDATA[cyber-security-thumbnail.png]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/cyber-security-thumbnail.png]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cyber-security-thumbnail.png]]></file_full_path>
                  <filemime>image/png</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[A man with a white hat in a crowd of black hats.]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="596531">
            <nid>596531</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity feature graphic]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>227356</fid>
                  <filename><![CDATA[cyber-security-header-still-resized.png]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/cyber-security-header-still-resized.png]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cyber-security-header-still-resized.png]]></file_full_path>
                  <filemime>image/png</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Georgia Tech is taking on cybersecurity from multiple angles]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[tara.labouff@iisp.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p><em>By Gordana Goudie, Tara La Bouff, Jacqueline Nemeth, and Mike Terrazas</em></p>

<p><strong>Tara La Bouff</strong></p>

<p>Marketing Communications Manager&nbsp;<br />
Institute for Information Security &amp; Privacy<br />
Georgia Institute of Technology<br />
<a href="mailto:tara.labouff@iisp.gatech.edu?subject=White%20Hats%2C%20Black%20Hats%2C%20Grey%20Matter%3A%20Tackling%20Cybersecurity%20feature">Email Tara</a></p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1300</item>
          <item>1281</item>
          <item>1289</item>
          <item>1274</item>
          <item>576491</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Economic Development and Policy]]>
      </item>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
          <item>
        <![CDATA[Policy, Social Sciences, and Liberal Arts]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>131</tid>
        <value><![CDATA[Economic Development and Policy]]></value>
      </item>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
          <item>
        <tid>151</tid>
        <value><![CDATA[Policy, Social Sciences, and Liberal Arts]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>
          <term tid="39481"><![CDATA[National Security]]></term>
          <term tid="39511"><![CDATA[Public Service, Leadership, and Policy]]></term>
          <term tid="39541"><![CDATA[Systems]]></term>
      </core_research_areas>
  <field_news_room_topics>
          <item>
        <tid>71881</tid>
        <value><![CDATA[Science and Technology]]></value>
      </item>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1300</item>
          <item>1281</item>
          <item>1289</item>
          <item>1274</item>
          <item>576491</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Institute Communications]]></item>
          <item><![CDATA[Ivan Allen College of Liberal Arts]]></item>
          <item><![CDATA[School of Public Policy]]></item>
          <item><![CDATA[Scheller College of Business]]></item>
          <item><![CDATA[CRNCH]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>344</tid>
        <value><![CDATA[cyber]]></value>
      </item>
          <item>
        <tid>145981</tid>
        <value><![CDATA[IISP]]></value>
      </item>
          <item>
        <tid>175690</tid>
        <value><![CDATA[white hats]]></value>
      </item>
          <item>
        <tid>175691</tid>
        <value><![CDATA[black hats]]></value>
      </item>
          <item>
        <tid>175692</tid>
        <value><![CDATA[grey hats]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
