Cybersecurity Current Events | Page 2

Cybersecurity Current Events, Cybersecurity News Articles.
Sort By: Most Viewed | Most Recent
Page 2 of 8 | 281 Results
Tel Aviv University to host leading international cyber conference
Cyber Week 2014, one of the most important annual cyber events, is slated to take place in Israel on September 14-17. The signature event of the conference series, the 4th Annual International Cybersecurity Conference, will be held at Tel Aviv University on September 14th. Prime Minister Benjamin Netanyahu is scheduled to speak at the event. (2014-07-15)

SDSC and Leidos to help develop new cybersecurity reference architecture for electrical microgrids
The San Diego Supercomputer Center at the University of California, San Diego, is collaborating with Leidos (formerly Science Applications International Corporation) to develop a reference system architecture aimed at increasing security levels of microgrid control and IT systems used to manage electrical microgrids worldwide. (2014-01-21)

Sandia experts, students explore cyber issues during weeklong summer institute
Top graduate students pursuing careers in cybersecurity worked alongside Sandia and other prominent cybersecurity experts in a week-long summer institute sponsored by Sandia National Laboratories at the Livermore Valley Open Campus. Cyber Security Technology, Policy, Law, and Planning for an Uncertain Future, which followed last year's institute on energy technology and policy, focused on cyber law, policy, information sharing and other cyber-related issues. Three mentors led the students through a robust series of high-level talks, discussions and workshops from Aug. 5-10. (2012-08-24)

UH receives $1.5 million grant to prepare future cybersecurity workers
With breaches in data on the rise, cybersecurity is a growing concern. The University of Houston has been awarded a $1.5 million CyberCorps grant from the National Science Foundation to train students in this increasingly important area of national security. The congressionally mandated CyberCorps Scholarship for Service program is aimed at increasing and strengthening the cadre of information assurance professionals who protect the government's critical information infrastructure. (2014-11-11)

NSF funds research to enable distributed, fair and privacy-preserving collaboration
Dr. Susanne Wetzel of Stevens Institute of Technology has recently been awarded a $457K research grant from the National Science Foundation to investigate privacy and security in the context of enabling collaboration. (2010-09-23)

Cyber technology, policy, law and planning to be focus of Sandia Labs summer institute
Graduate students pursuing careers related to cybersecurity, including specialties in computer science, engineering, law, public policy, economics and social sciences, are being encouraged to apply for Cyber Security Technology, Policy, Law and Planning for an Uncertain Future, a weeklong summer institute at Sandia National Laboratories in Livermore, Calif. The program will take place Aug. 5-10 and is open to US citizens and foreign nationals. (2012-03-01)

Streamlining the Internet of Things and other cyber-physical systems
In an Institute of Electrical and Electronics Engineers (IEEE) keynote paper, computer engineers lay out a framework to improve research on cyber-physical systems. They encourage combining model-based design with data-based learning: in other words, merge two existing paradigms into one practice. (2017-01-03)

Expanding the breadth and impact of cybersecurity and privacy research
As our lives and businesses become ever more intertwined with the Internet and networked technologies, it is crucial to continue to develop and improve cybersecurity measures to keep our data, devices and critical systems safe, secure, private and accessible. (2014-07-31)

UTSA to develop online cybersecurity training for communities
The Center for Infrastructure Assurance and Security at The University of Texas at San Antonio has received $300,000 from FEMA to develop online training for community emergency managers. The training will be especially relevant to small communities, which often do not have the financial resources to properly address emergency planning and response to cyber attacks. (2014-11-24)

Roadmap to safer cyberspace
How do cybersecurity experts discover how to properly defend a system or build a network that's secure? As in other domains of science, this process involves hypothesis, experimentation, and analysis -- or at least it should. In reality, cybersecurity research can happen in an ad hoc fashion, often in crisis mode in the wake of an attack. (2015-12-17)

Louisiana Tech University, Riverside Research partner to pursue academic, research initiatives
Louisiana Tech University and Riverside Research, a not-for-profit defense contractor that supports government, industry, and academic institutions around the nation in the development and application of cybersecurity technologies, signed an agreement Wednesday that will enable the two organizations to jointly pursue new academic and educational research initiatives. (2013-10-02)

Computer scientists' new tool fools hackers into sharing keys for better cybersecurity
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them. The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a decoy site so the computer can learn from hackers' tactics. The information is then used to train the computer to recognize and stop future attacks. (2020-02-27)

What's in a name?
The DHS Science and Technology Directorate is working to restore trust in the system and make websites more secure and reliable by improving the Internet's Domain Name System. (2011-12-06)

Fighting the next generation of cyberattacks
Computer scientists at the University of Utah are developing software to detect so-called algorithmic attacks, an emerging hacking threat that is nearly impossible to find with existing security technology. (2015-04-16)

UTSA researchers create framework to stop cyber attacks on internet-connected cars
A new study by Maanak Gupta, doctoral candidate at The University of Texas at San Antonio, and Ravi Sandhu, Lutcher Brown Endowed Professor of computer science and founding executive director of the UTSA Institute for Cyber Security (ICS), examines the cybersecurity risks for new generations of smart which includes both autonomous and internet connected cars. (2018-05-29)

New brain-inspired cybersecurity system detects 'bad apples' 100 times faster
The Neuromorphic Cyber Microscope can look for the complex patterns that indicate specific 'bad apples,' all while using less electricity than a standard 60-watt light bulb, due to its brain-inspired design. (2017-03-21)

Stevens receives National Science Foundation grant for cybersecurity scholars
Stevens Institute of Technology has been awarded $850,672 in scholarship money from the National Science Foundation to fund students interested in cybersecurity and committed to working for the federal government. (2009-01-30)

UTSA cybersecurity center collaborates on $800,000 FEMA grant to create cybersecurity consortium
The University of Texas at San Antonio Center for Infrastructure Assurance and Security, the University of Arkansas System's Criminal Justice Institute and the University of Memphis' Center for Information Assurance have received a three-year, $800,000 grant from the Federal Emergency Management Agency to help states and communities prepare for, detect and respond to cyber attacks in a consistent manner. (2014-04-11)

Army researchers identify new way to improve cybersecurity
Researchers at the US Army Combat Capabilities Development Command's Army Research Laboratory, the Army's corporate research laboratory also known as ARL, and Towson University may have identified a new way to improve network security. (2019-04-17)

NREL's cybersecurity initiative aims to wall off the smart grid from hackers
A new initiative underway at Energy Department's National Renewable Energy Laboratory (NREL) is intended to prevent hackers from gaining control of parts of the nation's power grid, potentially damaging electrical equipment and causing localized power outages. (2016-01-05)

New global cybersecurity center planned by German and Israeli research leaders
The Hebrew University of Jerusalem in Israel, and the Fraunhofer Institute for Secure Information Technology SIT in Germany, have agreed to create a Fraunhofer Project Center for Cybersecurity in Jerusalem. The center is meant to become the leading institution for applied cybersecurity research in Israel and worldwide, conducting targeted research projects, building joint experimentation platforms and research labs, and creating a strong network of partners from industry, governments and other research organizations. (2015-11-04)

New UMD Cybersecurity Center aims at public-private partnerships
The University of Maryland is launching a new cybersecurity initiative to stimulate public-private partnerships and address national vulnerabilities, including those facing industry. It will stress (2010-10-19)

UT Dallas professor to develop framework to protect computers' cores
UT Dallas cybersecurity expert Dr. Zhiqiang Lin has received funding from the US Air Force to develop a defense framework that burrows deep into a computer system to protect its core. (2014-04-18)

Mason researchers keep networks moving to stay safe from hacker attacks
Imagine burglars have targeted your home, but before they break in, you've already moved and are safe from harm. Now apply that premise to protecting a computer network from attack. Hackers try to bring down a network, but critical tasks are a step ahead of them, thanks to complex algorithms. The dreaded 'network down' or denial of service message never flashes on your screen. (2016-05-17)

White House cybersecurity coordinator, DHS officials to speak at IEEE Homeland Security Conference
Howard A. Schmidt, national cybersecurity coordinator, and two DHS officials will be a featured speakers at the 2010 IEEE International Conference on Technologies for Homeland Security in November. (2010-07-22)

US needs new national strategy for era of cyber aggression, new paper concludes
Deterrence won't work as a posture for protecting the United States from those who seek to use cyber aggression to damage the country. So says a new paper from the University of Cincinnati, which suggests that to remain safe in cyberspace, the US must be much more prepared to go on the offensive. (2010-04-19)

Carnegie Mellon experts will brief Silicon Valley business leaders
Carnegie Mellon University cybersecurity experts will brief a select group of senior executives from security, technology and the law enforcement sector about trustworthy computing, software security and business risks. (2010-03-05)

Cultural differences account for global gap in online regulation -- study
Differences in cultural values have led some countries to tackle the specter of cyber-attacks with increased internet regulation, whilst others have taken a 'hands-off' approach to online security -- a new study shows. (2019-12-02)

Clear tactics, but few easy solutions, for hospitals combating ransomware
Hospitals facing the prospect of ransomware attacks like the one that afflicted British hospitals in May can take many concrete steps to better protect themselves, but some of the most important measures -- such as a national policy not to pay ransoms -- may be tougher to formulate. (2017-09-19)

How susceptible are hospital employees to phishing attacks?
A multicenter study finds high click rate for simulated phishing emails, potential benefit in phishing awareness training. (2019-03-11)

Can your cardiac device be hacked?
Medical devices, including cardiovascular implantable electronic devices could be at risk for hacking. In a paper publishing online today in the Journal of the American College of Cardiology, the American College of Cardiology's Electrophysiology Council examines the potential risk to patients and outlines how to improve cybersecurity in these devices. (2018-02-20)

Cybersecurity teams that don't interact much perform best
Army scientists recently found that the best, high-performing cybersecurity teams have relatively few interactions with their team-members and team captain. (2018-04-26)

US IT infrastructure not adequately prepared for cyber attacks, says IEEE-USA
Because our nation's information technology infrastructure is highly vulnerable to hackers, terrorists, organized crime syndicates and natural disasters, increased funding for cyber security research and development is needed, according to a recent position adopted by IEEE-USA. (2006-07-14)

ETH meets California
ETH Zurich, The Swiss Federal Institute of Technology in Zurich, Switzerland brings its top researchers to California to unravel the mysteries of science and technology. From Cybersecurity to Robots; and from Responsive 'Smart' Cities to Earthquakes, partners like Disney Research, Google, and GoPro will connect with a community of scientists, engineers, and industry leaders. This series of free public gatherings takes place in San Francisco and the Bay Area from April 6th - 15th, 2016. (2016-04-05)

A Georgia State cybersecurity study of the dark web exposes vulnerability to machine identities
A thriving marketplace for SSL and TLS certificates -- small data files used to facilitate confidential communication between organizations' servers and their clients' computers -- exists on a hidden part of the Internet, according to new research by Georgia State University's Evidence-Based Cybersecurity Research Group (EBCS) and the University of Surrey. (2019-03-08)

R&K Cyber Solutions licenses ORNL malware detection technology
Washington DC-based R&K Cyber Solutions LLC has licensed Hyperion, a cyber security technology from the Department of Energy's Oak Ridge National Laboratory that can quickly recognize malicious software even if the specific program has not been previously identified as a threat. (2015-01-16)

Sandia cyber-testing contributes to DHS Transition to Practice
Through the Department of Homeland Security's Transition to Practice program, cybersecurity technologies developed at Sandia National Laboratories -- and at other federal labs -- now stand a better chance of finding their way into the real world. (2014-09-10)

Partnership prepares undergraduates to tackle cybersecurity
The Software Assurance Marketplace, housed at the Morgridge Institute for Research at the University of Wisconsin-Madison, is working to address a major cybersecurity skills gap in US undergraduate computer science programs. (2016-05-16)

UMass Amherst, Harvard experts say better systems needed for medical device cybersecurity
Researchers from Beth Israel Deaconess Medical Center Harvard Medical School and the University of Massachusetts Amherst analyzed reports from decades of US Food and Drug Administration's (FDA) databases and found that established mechanisms for evaluating device safety may not be suitable for security and privacy problems. The researchers, members of the Strategic Healthcare IT Advanced Research Projects on Security (SHARPS), report results in the current issue of the PLoS ONE journal. (2012-07-19)

UK and Singapore collaborating to address cyber threats
Six new joint research projects will see UK and Singapore-based researchers collaborating to develop new solutions that will enhance the resilience of systems and infrastructure to cyber attacks. The UK's Engineering and Physical Sciences Research Council and Singapore's National Research Foundation today announced the results of a joint £2.4 million ($5.1 million) research call, which will fund the projects over the next three years. (2015-12-16)

Page 2 of 8 | 281 Results
   First   Previous   Next      Last is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to