THE CENTER FOR CYBERSECURITY PRESENTS:
November 16, 2017
October 19, 2017
By developing ways to make automotive software and hardware more resistant to hacking, keep banking PINs reliably private, and a host of other important research, Tandon is always working towards a safer, more secure world. Read on to learn about what our cybersecurity experts have accomplished recently.
October 5, 2017
China’s crackdown on ICO’s highlights an underappreciated perspective: consumer protection
October 17, 2017
Don’t let nefarious coders take you for a ride. Late-model cars are basically just engines wrapped in computers. Those computers need updates, but malicious code hidden in software can leave you driving a couple tons of compromised steel. Hackers could track you, or even steer you off the road. Uptane—an open-source software protocol—checks incoming instructions for correct cryptographic signatures before accepting any downloads.[Uptane is a collaboration of NYU Tandon, the University of Michigan Transportation Research Institute (UMTRI), and the Southwest Research Institute (SwRI)]
September 28, 2017
The headlines calling out tech’s gender gap just keep coming. For women in tech who are used to sexism and discrimination, this isn’t really news. So what could fix the problem? VICE News asked women who work in tech how they’d fix the industry’s gender gap, and they pointed to three main areas for improvement: hiring, education, and retention. We spoke to women at various stages of their careers to find out which of these areas needs the biggest push. [featuring Prof. Phyllis Frankl]
October 11, 2017
In this article, Sasha Romanosky and Zachary Goldman address the problem of how to define “collateral damage” in the cyber realm.
September 26, 2017
But does Equifax have a problem retaining top talent? The great demand for cybersecurity experts at companies across the world could be one of the reasons these people moved jobs, Dr. Edward Amoroso, a distinguished research professor at New York University’s Tandon School of Engineering, said in a recent interview. Dr. Amoroso said that chief information security officer (CISO) is often viewed as an appendage to the executive team, a ‘hired gun’ that may be more likely to leave. ‘The solution is that the CEO needs to build a better, more trusting relationship with the CISO,’ said Dr. Amoroso.