Category: <span>Press Highlights</span>

Home / Press Highlights
Post

IBM Watson Steps Into Real-World Cybersecurity

IBM has launched the Watson for Cyber Security beta program to encourage companies to include Watson in their current security environments. The problem with unstructured data is knowing when one piece of information is more valuable than another and which sources of information are more reliable. But the beauty of Watson is that ‘crucial nuggets...

Post

Proposed NY Cybersecurity Regulation: A Giant Leap Backward?

Judith Germano Mid-November marked the end of the comment period for New York’s “first in nation” proposed cybersecurity legislation for financial institutions. As the hot topic of the day, many regulators and government officials have felt compelled to take a stand on cybersecurity. It seems counterintuitive to set out to protect constituents by inaction. But...

Post

Online Banking Privacy Hack: Use 2 Browsers to Increase Your Security

Online shopping and banking is efficient and convenient, but it just takes one security breach for tons of personal information to get in the wrong hands. … Using a second browser dedicated exclusively to online shopping and banking can offer some added security from specific types of attacks, according to Justin Cappos, a computer security...

Post

WNYU Radio Interview with Professor Nasir Memon (audio)

Is your credit card ripe for the picking? Some say it is, after crooks finish hijacking a record breaking $4 billion in credit card fraud by the end of 2016. WNYU’s Devin Knight spoke with computer engineering and network security professor Nasir Memon [of NYU Tandon School of Engineering] about ways to protect your info.

Post

How IBM’s Watson Will Change Cybersecurity

IBM captured our imaginations when it unveiled Watson, the artificial intelligence computer capable of playing—and winning—the “Jeopardy” game show. … “Generally we learn by examples,” says Nasir Memon, professor of computer science and engineering at NYU Tandon School of Engineering. “We get an algorithm and examples, and we learn when we are able to look...

Post

Wanted: Smart Public Policy for Internet of Things Security

Increasingly, the Internet of Things has become a weapon in hackers’ schemes…Now, experts in the U.S. are asking regulators to step in. Calls for public policy to improve device security have reached a fever pitch following a series of high-profile denial-of-service attacks leveraged in part by unsuspecting DVRs, routers, and webcams. In October, hackers flooded the...

Post

A massive cyberattack blocked your favorite websites; FBI and Homeland Security are investigating

The Department of Homeland Security and the FBI are investigating a massive cyberattack that stopped or slowed access to Twitter, Spotify, Amazon and other sites.…Hacking an email server or stealing user account information from a network is more targeted than a DDoS attack, which aims to cause widespread disruption, said Justin Cappos, a professor in...