Despite appearances, there is some important bipartisan work afoot on Capitol Hill. On Aug. 1, Sens. Mark Warner, Cory Gardner, Ron Wyden and Steve Daines dropped the Internet of Things (IoT) Cybersecurity Improvements Act of 2017.
Category: CCS News
The State of Cyber Sanctions
In this episode, FIN Chairman Juan Zarate hosts a discussion with FIN Senior Adviser Zachary Goldman on the current state of cyber sanctions, cybercrime, and the convergence of cyber security and the anti-money laundering system.
NYU Security Researchers at Black Hat Reveal How to Protect the Power Grid from Low-budget Attacks
…The researchers are part of the small and increasingly influential group of cybersecurity researchers at NYU exploring hardware trustworthiness and educating experts worldwide about their findings. Under the aegis of the NYU Center for Cybersecurity, faculty and student researchers at NYU Abu Dhabi and NYU Tandon are recognized as leaders in research on secure chip...
Former Homeland Security Adviser Lisa Monaco on fighting ISIS on social media
Former Homeland Security Adviser Lisa Monaco on fighting ISIS on social media.
Affiliate Roundtable: Privacy and Data Security
The collection, storage, use, and disclosure of consumer data are hot topics in the legal, regulatory, and legislative communities.
How Biometric Authentication Poses New Challenges to Our Security and Privacy
Nasir Memon The use of biometric data—an individual’s measurable physical and behavioral characteristics—isn’t new. Government and law enforcement agencies have long used it. … Using biometric data to access our personal devices is increasing as a way to get around the limitations of the commonly used password-based mechanism: it’s easier, more convenient, and (theoretically) more...
America's Online Enemies
From election meddling and economic espionage to financial fraud and personal identity theft, it’s becoming clear that cybersecurity is increasingly central to every aspect of the way we live. Both state-sponsored cyber-spies and transnational organized crime groups pose urgent threats online to our nation’s critical infrastructure, our security, and our fundamental values in a democratic...
Malcolm Turnbull faces Silicon Valley fight on encryption
If Malcolm Turnbull presses forward on threats to force technology companies to better cooperate on countering terrorism — by unlocking secret encrypted messages and data belonging to suspected violent plotters — the Prime Minister can expect a heated tussle with America’s powerful Silicon Valley.
Guide to the top college and university cyber security degree programs
The shortage of cybersecurity professionals is well documented, and this lack of expertise can keep organizations from bolstering their security programs…NYU Tandon School of Engineering offers a master’s degree in cyber security, and the program is rooted in the belief that theory and research must translate into real-world solutions, says Nasir Memon, professor of computer...
Booted: An Analysis of a Payment Intervention on a DDoS-for-Hire Service
Ryan Brunt, Prakhar Pandey and Damon McCoy. Distributed Denial of Service (DDoS) attacks have become a growing threat that, to a large extent, have become commoditized by DDoS-for-hire, or “booter”, services. In this case study, we analyze leaked fine-grain “ground truth” data from a larger booter service, VDoS, which earned over $597,000 over two years...