Bluesky Facebook Reddit Email

New intrusion tolerance software fortifies server security

The Self Cleansing Intrusion Tolerance (SCIT) technology developed by George Mason University researchers limits the damage caused by unknown cyber-attacks by restricting exposure time. By periodically cleansing servers, SCIT reduces the risk of data theft and provides an additional layer of defense against intrusions.

Dartmouth launches network security study

A team of Dartmouth researchers is launching the Dartmouth Internet Security Testbed (DIST) to examine live network activity and develop methods for detecting malicious activity. The project will provide valuable insights into securing wireless networks, improving network security technology and practices for all internet users.

Stevens honors cybersecurity experts at Convocation 2006

Susanne Wetzel and Rebecca Wright are recognized for their work on a new undergraduate degree program in cybersecurity at Stevens Institute of Technology. The program is designed to provide students with security expertise within a broad education, preparing them for careers in information assurance and computer security.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Wetzel and Wright awarded grant for cybersecurity lab

The new lab will provide practical training in security and information assurance, preparing students to meet the challenges in protecting the nation's information infrastructure. The lab will increase the number of IT professionals educated and trained in theoretical and practical aspects of information assurance and security.

NSF launches computer security center

The TRUST consortium, funded by NSF's Science and Technology Centers program, aims to create new technologies that make computer software and networks inherently secure. Researchers will focus on protecting against attacks, ensuring data integrity, and developing tools for building trustworthy systems.

UC Berkeley to lead $19 million NSF center on cybersecurity research

The Team for Research in Ubiquitous Secure Technology (TRUST) center aims to develop new technologies to design, build, and operate trustworthy information systems. The researchers will focus on developing secure embedded systems, integrating trusted components, and creating information management software tools.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

XML-based language formats checklists for IT security

The XCCDF specification document provides a flexible, vendor-neutral format for measuring conformance to security benchmarks and generating records of benchmark tests. NIST is developing computer security checklists for widely used government agencies with the help of organizations like NSA and DHS.

Federal standard issued for improving IT security

The new standard provides detailed guidance on categorizing systems and assessing potential impact of security breaches. It will help agencies make informed decisions and implement cost-effective security measures, complemented by a companion standard specifying minimum federal system requirements.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.