Press "esc" to clear
Go to Advanced Search

Showing results

601610 of 677

Article ID: 589631

Law Professor: ‘Devil Is in the Details’ of Cybersecurity Bill

University at Buffalo

The “devil is in the details” of the Cyber Intelligence Sharing and Protection Act (CISPA) pending in the U.S. Congress, says University at Buffalo Associate Professor Mark Bartholomew, an expert in intellectual property and cyber law.

Released:
22-May-2012 12:50 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Law and Public Policy

Article ID: 589164

Cybersecurity Experts Begin Investigation on Self-Adapting Computer Network That Defends Itself Against Hackers

Kansas State University

Kansas State University cybersecurity experts are researching the feasibility of building a computer network that could protect itself against online attackers by automatically changing its setup and configuration.

Released:
10-May-2012 10:15 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 586373

Cybersecurity Technology, Policy, Law and Planning to Be Focus of Sandia Labs Summer Institute for Top Grad Students

Sandia National Laboratories

Graduate students pursuing careers related to cybersecurity, including specialties in computer science, engineering, law, public policy, economics and social sciences, are being encouraged to apply for Cyber Security Technology, Policy, Law and Planning for an Uncertain Future, a weeklong summer institute at Sandia National Laboratories in Livermore, Calif. The program will take place Aug. 5-10 and is open to U.S. citizens and foreign nationals.

Released:
1-Mar-2012 1:15 PM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Education

Channels:

Cybersecurity

Article ID: 586290

Privacy Rules: Web Expert Explains New Google Policy

Cornell University

Lee Humphreys, Cornell assistant professor of communication, offers insight into the new privacy rules going into effect on Google websites on March 1, 2012

Released:
29-Feb-2012 7:10 AM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites

Pop Culture

FulpandCrouse.jpg

Article ID: 585768

Genetics Inspired Research Prevents Cyber Attacks

Wake Forest University

Leveraging the concept of “survival of the fittest,” Wake Forest University researchers are fighting the continual evolution of computer viruses, worms and malware with evolution by developing the first-ever automated computer configurations that adjust as quickly as the threats.

Released:
14-Feb-2012 11:00 AM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
OQ-winnerpic.JPG

Article ID: 585490

Students Design Virtual ID Badge to Combat Online Hackers

University of Utah

A student entrepreneurial team at the University of Utah believes it has come up with a winning business plan for a virtual ID badge that operates off of any mobile device. The product could be used in place of other common electronic ID badges used by hospitals, defense companies or other firms where securing data is of the utmost importance.

Released:
7-Feb-2012 12:05 AM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites

Article ID: 584981

Drexel University Lab Releases Software to Discern and Disguise Authorship

Drexel University

Computer engineers at Drexel University developed a pair of open-source software programs that could help protect the free speech of whistle-blowers and protestors, among other groups. One program uses a series of filters to determine the author of a document from a group of possible writers, while the other helps to make a writer truly anonymous by hiding patters in writing style.

Released:
24-Jan-2012 11:00 AM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
Cate.jpg

Article ID: 584757

Consumers Should Be Vigilant in Wake of Zappos Cyberattack

Indiana University

As an estimated 24 million Zappos.com customers begin receiving notifications that some of their personal data have been compromised, an Indiana University expert is warning those affected to be on the lookout for targeted fraud attempts.

Released:
17-Jan-2012 11:00 AM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Law and Public Policy

Article ID: 584751

Zappos Breach Goes Beyond Credit Cards: Consumers Face Identity Theft if Hackers Correlate Other Penetrated Databases, Says Cornell Expert

Cornell University

Stephen B. Wicker, Cornell professor of Electrical and Computer Engineering at Cornell University, comments on the Zappos web site breach by hackers.

Released:
17-Jan-2012 9:00 AM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites

Channels:

Cybersecurity

Article ID: 584500

Professor's Signcryption Technology Tightens Cyber Security

University of North Carolina at Charlotte

UNC Charlotte professor Yuliang Zheng invented the revolutionary new technology and he continues his research in the College of Computing and Informatics. After nearly a three-year process, his research efforts have been formally recognized as an international standard by the International Organization of Standardization (ISO).

Released:
6-Jan-2012 3:30 PM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Showing results

601610 of 677





Chat now!