Judith Germano Mid-November marked the end of the comment period for New York’s “first in nation” proposed cybersecurity legislation for financial institutions. As the hot topic of the day, many regulators and government officials have felt compelled to take a stand on cybersecurity. It seems counterintuitive to set out to protect constituents by inaction. But...
Author: Julia Solomon-Strauss (Julia Solomon-Strauss)
What Is Cyber Collateral Damage? And Why Does It Matter?
Zachary K. Goldman and Sasha Romanosky What happens when the consequences of a cyberattack are not physical? What happens when a digital missile destroys or corrupts data in a manner that is not intended by the person launching a lawful cyberattack? Current legal and policy frameworks for assessing collateral damage do not squarely address the...
Wanted: Smart Public Policy for Internet of Things Security
Increasingly, the Internet of Things has become a weapon in hackers’ schemes…Now, experts in the U.S. are asking regulators to step in. Calls for public policy to improve device security have reached a fever pitch following a series of high-profile denial-of-service attacks leveraged in part by unsuspecting DVRs, routers, and webcams. In October, hackers flooded the...
A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities
Bodhisatwa Mazumdar, Sk. Subidh Ali, and Ozgur Sinanoglu In this article, the authors present a compact implementation of the Salsa20 stream cipher that is targeted towards lightweight cryptographic devices such as radio-frequency identification (RFID) tags.
See video from our "Women Leaders in Cybersecurity" conference
Footage from our day-long discussion of closing the gender gap in cybersecurity is now available. See more details about the event here.
A Dual Perturbation Approach for Differential Private ADMM-Based Distributed Empirical Risk Minimization
Tao Zhang and Quanyan Zhu In this paper, the authors develop a privacy-preserving method to a class of regularized empirical risk minimization (ERM) machine learning problems.
A Comparative Security Analysis of Current and Emerging Technologies
Chandra K.H. Suresh, Bodhisatwa Mazumdar, Sk Subidh Ali, and Ozgur Sinanoglu In this article, the authors offer a security analysis of nanoelectromechanical systems (NEMS) and carbon nanotube (CNT). They highlight the key technology-specific features of these post-CMOS technologies that can inform the design of secure systems.
6 Threats To Your Identity, From Cyber To The Existential
Earlier this year I received a letter from the United States Office of Personnel Management, informing me that a “malicious cyber intrusion had been carried out against the U.S. Government.”…my Social Security number and other pieces of personal information were taken in the hack affecting 4.2 million government employees.
Detecting malicious logins in enterprise networks using visualization
Hossein Siadati, Bahador Saket, Nasir Memon The authors present APT-Hunter, a visualization tool that helps security analysts to explore login data for discovering patterns and detecting malicious logins
MasterCard Exec, Others Urge Flexible Cybersecurity Regime
During a panel at a Women Leaders in Cybersecurity symposium hosted by New York University‘s Center of Cybersecurity, executives from MasterCard Inc. and Goldman Sachs Group Inc., as well as former government officials who are now in the private sector, explored the complex regulatory landscape that faces business when it comes to cybersecurity.