Category: <span>Press Highlights</span>

Home / Press Highlights
Post

Ensuring Chip Integrity: Siddharth Garg on Securing the Electronic Supply Chain

In today’s electronics industry, chips are designed by globally dispersed teams, outsourced for fabrication, packaging, and testing, and distributed via complex supply chains. In such a scenario, how can chip integrity be guaranteed against threats such as intellectual property (IP) theft, malicious modification, and counterfeiting? Siddharth Garg, assistant professor of electrical and computer engineering at...

Post

Does My Eye Deceive Me? Not With These Digital Forensics Tools

The Internet is awash with images and videos that may hold national security and intelligence value, but the task of teasing out real images from  altered ones is formidable. Even off-the-shelf editing tools can trick digital forensics experts. Nasir Memon, professor of computer science and engineering at the New York University Tandon School of Engineering,...

Post

MasterCard Exec, Others Urge Flexible Cybersecurity Regime

During a panel at a Women Leaders in Cybersecurity symposium hosted by New York University‘s Center of Cybersecurity, executives from MasterCard Inc. and Goldman Sachs Group Inc., as well as former government officials who are now in the private sector, explored the complex regulatory landscape that faces business when it comes to cybersecurity.

Post

N.S.A. Suspect Is a Hoarder. But a Leaker? Investigators Aren’t Sure.

On a half-dozen occasions in the last three years, top-secret information has leaked from the National Security Agency and appeared on the web. Government analysts concluded with alarm that the documents, including intercepted communications from Europe and Japan and the computer code for the N.S.A.’s hacking tools, had not come from the huge collection taken...

Post

10 Questions: Raj De's career has taken him from 9/11 Commission to White House to NSA

Nearly 20 years ago, a young Harvard Law School student named Raj De sat in his mentor’s office and explained why he’d decided to bypass BigLaw for the Department of Justice. The older lawyer understood completely. “You should always go where the action is,” he counseled. De took this advice—and then some. Leadership roles at...

Post

11 Signs Your Computer Is at Risk of Being Hacked

You lock your house. You keep your wallet out of plain view. You’re responsible with credit cards. You should treat your computer with the same caution, but even the most accountable people can make mistakes that make them susceptible to cybercriminals.

Post

The lesson about email safety we can learn from Hillary Clinton and Colin Powell

This election year may well be the year of the email controversy. From Colin Powell’s emails to Hillary Clinton’s private server to the Democratic National Committee’s email leak to Donald Trump openly encouraging Russian hackers, it’s easy to see that even those with likely the tightest security measures in place are still victim to break-ins.