Events

A Small Hardware Assumption Can Go a Long Way Towards Privacy

Speaker: Aniket Kate, Saarland University Trusted hardware modules are becoming prevalent in computing devices of all kinds. A broad trusted hardware assumption purports to solve almost all security...

Why Cybersecurity is So Difficult

Hosted by Jonathan Zittrain, Bemis Professor of Law and Professor of Computer Science, Harvard University Part of NYU's Security Research Seminar. The seminar on security and information...

Cyber Insurance and Corporate Governance: Facing New Threats

FREE and open to the public. As American corporations struggle with managing the risks from cyber breaches, cyber security thought-leaders from government, industry, and academia will explore how to...

Event Archives

Building Secure Operating Systems

Speaker: Vasileios Kemerlis, Columbia University (Department of Computer Science) Today's...

Rise of the Planet of the Apps: Security and Privacy in the Age of Bad Code

Speaker: Suman Jana , Stanford University Computing is undergoing a major shift. Third-party...

Software Security and the Building Security in Maturity Model (BSIMM)

Speaker: Gary McGraw, Ph.D., CTO, Cigital Using the framework described in my book, “Software...

Analysis of Inter-Component Communication in Mobile Applications Through Retargeting

Speaker:  Damien Octeau,  University of Wisconsin-Madison and Pennsylvania State...

Privacy and Security in the Cloud: Some Realism About Technical Solutions to Transnational Surveillance in the Post-Snowden Era

Part of NYU's Security Research Seminar, hosted by Ira Rubinstein, Senior Research Fellow...

Data-Driven Security: A Socio-Economic Approach to Disrupting Cybercrime

Speaker: Damon McCoy, George Mason University Modern-day cybercrime is largely profit-fueled and...