<node id="551021">
  <nid>551021</nid>
  <type>news</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1467824892</created>
  <changed>1475896924</changed>
  <title><![CDATA[Minding Your Business: Cybersecurity in Georgia]]></title>
  <body><![CDATA[<p>A growing number of Georgia companies are devoted to preventing and containing damage from data breaches at businesses and government agencies. The information security industry, known as info-sec, is fueled by research at Georgia Tech, a cluster of well-funded start-ups from alumni and entrepreneurs, and concentration of the Army's Cyber Command at Fort Gordon.&nbsp;<strong>Dr. Wenke Lee</strong> describes the components of this "perfect storm" for <em>Georgia Trend</em> magazine.</p><p><a href="http://www.georgiatrend.com/July-2016/Minding-Your-Business/" target="_blank">Read More</a></p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[Information security industry is booming in Georgia, fueled by startups and Army Cyber Command]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2016-07-01T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[A growing number of Georgia organizations are devoted to preventing cyberattacks, with Georgia Tech faculty, students and alumni driving this growth as threats increase.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>A growing number of Georgia companies are devoted to preventing and containing damage from data breaches at businesses and government agencies. The information security industry, known as info-sec, is fueled by research at Georgia Tech, a cluster of well-funded start-ups from alumni and entrepreneurs, and concentration of the Army's Cyber Command at Fort Gordon.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="551031">
            <nid>551031</nid>
            <type>image</type>
            <title><![CDATA[Photo Credit: JenniferStalcup.com]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>93167</fid>
                  <filename><![CDATA[26_cyberopener-96e939fe.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/26_cyberopener-96e939fe.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/26_cyberopener-96e939fe.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Photo Credit: JenniferStalcup.com]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
          <term tid="39481"><![CDATA[National Security]]></term>
          <term tid="39501"><![CDATA[People and Technology]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>2678</tid>
        <value><![CDATA[information security]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
