Skip to content ↓

Topic

Cybersecurity

Download RSS feed: News Articles / In the Media / Audio

Displaying 76 - 90 of 99 news clips related to this topic.
Show:

CBS News

Writing for CBS News, Charles Choi explores a system developed by MIT researchers that can identify letters in a closed book. The system could be used to examine ancient books or to “scan through large amounts of documents without having to mechanically separate the pages, which could be useful for libraries, banks and others,” says research scientist Barmak Heshmat. 

Salon

Salon reporter Scott Eric Kaufman writes that MIT researchers have created a system that can read the pages of a closed book and could be used to examine manuscripts too fragile to handle. “The system works by shooting pulses of radiation from a terahertz camera and measuring how long it takes for them to bounce back." 

Popular Science

MIT researchers have developed a new computational imaging technique that can read closed books, reports G. Clay Whittaker for Popular Science. The technique could be useful for “rare book research, where opening a book may be impossible due to damage, or not worth the risk of damage.”

CBS News

MIT researchers have developed an artificial intelligence platform that uses input from human analysts to predict cyber-attacks, reports Brian Mastroianni for CBS News. “We realized, finding the actual attacks involved a mix of supervised and unsupervised machine-learning,” explains research scientist Kalyan Veeramachaneni. 

Wired

Wired reporter Brian Barrett writes that MIT researchers have developed a new system to help detect cyber-attacks. Barrett explains that the system, “reviews data…and pinpoints anything suspicious. A human takes it from there, checking for signs of a breach. The one-two punch identifies 86 percent of attacks while sparing analysts the tedium of chasing bogus leads.” 

MIT Technology Review

In a talk at MIT, Robert Hannigan, director of Britain’s Government Communications Headquarters, expressed his hope that “technology companies and academic researchers will find ways to let government investigators get into encrypted devices without creating broad ‘back doors’ that undermine computer security,” writes Brian Bergstein for Technology Review

The Washington Post

In an article for The Washington Post, Daniel Weitzner writes that the U.S. government should respond to greater calls for access to communication and data in the wake of the Paris terrorist attacks by “strengthening the public policy framework that governs surveillance, both domestically and globally.”

The Wall Street Journal

Prof. Yossi Sheffi writes for The Wall Street Journal that businesses need to safeguard their supply chains against “black swan” events, rare situations that wreak havoc. Sheffi explains that the “changing nature of supply chains has made it more important to consider the potential impact of the black-swan event.”

Fortune- CNN

Writing for Fortune, Barb Darrow reports on the Cybersecurity Factory, an eight-week program developed by students from MIT CSAIL and Highland Capital Partners. The program is, “aimed at helping fledging cybersecurity companies get off the ground “The goal is to give these novice entrepreneurs some structure and advice on building and pitching their products,” Darrow explains. 

BetaBoston

Cybersecurity Factory, an accelerator founded by two MIT graduate students and Highland Capital, recently announced the winning teams who have been accepted into the pilot program, reports Janelle Nanos for BetaBoston. Nanos explains that the goal of Cybersecurity Factory is to “help founders overcome the myriad challenges they often face as they try to get cybersecurity companies off the ground.”

BetaBoston

Graduate students Jean Yang and Frank Wang have partnered with Highland Capital to launch a new bootcamp aimed at helping researchers commercialize their cybersecurity research, reports Janelle Nanos for BetaBoston. “A lot of university PhD students have all these great cybersecurity ideas that could solve a lot of real-life problems,” explains Wang. 

BetaBoston

Nidhi Subbaraman writes for BetaBoston about MIT’s new cybersecurity initiatives designed to “tackle tech security problems both big and small.” The new efforts are aimed at addressing cybersecurity’s technical, policy and business challenges. 

The Wall Street Journal

MIT is launching three cybersecurity efforts, including one aimed at managing cybersecurity within critical infrastructure, reports Rachael King for The Wall Street Journal. “We’re hoping to develop a number of new approaches and techniques that measure security culture in organizations,” says Prof. Stuart Madnick. 

BostInno

MIT is launching three new cybersecurity initiatives aimed at the technical, business and regulatory issues posed by cybersecurity, reports Conor Ryan for BostInno.  “We hope that these initiatives will help us work together with industry to create better tools to eliminate a lot of the current vulnerabilities that plague the digital landscape,” says Prof. Daniela Rus. 

Boston Globe

Matt Lee writes for The Boston Globe about the cybersecurity contest between stduents from MIT and University of Cambridge to devise better cybersecurity technologies and platforms. The competition will allow students an opportunity to tackle real-world cybersecurity challenges,  Lee explains