Cybersecurity Expert on Hacking and Power Grids
Michigan Technological University
DHS S&T’s Cyber Security Division held both online and in-person discussions around the country to engage a wide range of stakeholders to determine where the division should focus next in cyber security research and development.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) today announced the award of five contracts totaling $7.8 million for research on technologies to help defend against attacks on cyber physical systems.
National security analysts often find that available data is growing much faster than analysts’ ability to observe and process it. Sometimes they can’t make key connections and often they are overwhelmed struggling to use data for predictions and forensics. Sandia National Laboratories’ Pattern Analytics to Support High-Performance Exploitation and Reasoning (PANTHER) team has developed solutions that will enable analysts to work smarter, faster and more effectively when looking at huge, complex amounts of data in real-time, stressful environments where the consequences might be life or death.
Technologies that impact cyber security, increase our ability to detect trace amounts of chemicals, convert sewage into fuel, view energy processes under real-world conditions and forecast future electric needs are among the newest R&D 100 award winners at Pacific Northwest National Laboratory.
The cumulative number of successful phishing cyberattacks has risen sharply over the last decade, and in 2014 that figure surged past the total U.S. population, according to a University at Buffalo expert in cyber deception.
A Colorado State University-led team is developing a service that can sniff out, ward off and protect against large-scale online attacks known as Distributed Denial of Service, or DDoS, attacks.
Hewlett-Packard (HP) recently licensed one-of-a-kind technology – called Symbiote – from Red Balloon Security, to protect its printers from cyber attacks.
Computer & Information Sciences researchers tested users’ abilities to detect malware and phishing attacks while measuring the neurophysiological behavior underlying these tasks.
The results from a recent study showed that multitasking when using mobile devices creates stress and increases the potential for choosing unsafe apps.
In first-of-its-kind study, UC Riverside engineers quantify amount of Android root exploits available in commercial software and show that they can be easily abused
Researchers at University of New Mexico and the Lawrence Berkeley National Laboratory say cybersecurity breeches are not happening more frequently than they did a decade ago. And these data breaches in general are not growing in size.
Three Virginia Tech computer scientists are unveiling a novel approach to discovering stealth attacks on computers at the annual ACM Conference on Computer and Communications Security.
University of Arkansas engineering researchers, focused on solid-state solutions to upgrade the U.S. power grid, will lead a new national center devoted to cybersecurity for electric power utilities. The center is made possible by a $12.2 million grant from the U.S. Department of Energy, augmented by $3.3 million in matching funds from the research partners.
Ames Laboratory's Chris Strasburg discovered an interest in research while working in systems support and cybersecurity. He’s now the U.S. Department of Energy's Ames Laboratory’s cybersecurity manager and working toward a Ph.D. in computer science at Iowa State University, studying artificial intelligence approaches, automation of computer languages, and network security.
Lock Data Solutions has licensed a technology from the Department of Energy’s Oak Ridge National Laboratory designed to protect a company’s data from internal and external threats.
With an ever increasing number of everyday objects from our homes, workplaces and even from our wardrobes, getting connected to the Internet, known as the ‘Internet of Things (IoT), researchers from the University of Southampton have identified easy-to-use techniques to configure IoT objects, to make them more secure and hence help protect them from online attacks.