Skip to content ↓

Topic

Cybersecurity

Download RSS feed: News Articles / In the Media / Audio

Displaying 16 - 30 of 107 news clips related to this topic.
Show:

Government Technology

Senior Lecturer Luis Videgaray speaks with Government Technology reporter Nikki Davidson about concerns facing emerging AI programs and initiatives. Videgaray underscores the importance of finding vendors, "who are willing to protect the data in a way that is appropriate and also provides the state or local government agency with the required degree of transparency about the workings of the model, the data that was used for training and how that data will interact with the data supplied by the customer.”

CNBC

Prof. Stuart Madnick speaks with CNBC reporter Kevin Williams about how the rise of generative AI technologies could lead to cyberattacks on physical infrastructure. “If you cause a power plant to stop from a typical cyberattack, it will be back up and online pretty quickly,” Madnick explains, “but if hackers cause it to explode or burn down, you are not back online a day or two later; it will be weeks and months because a lot of the parts in these specialized systems are custom made.”

The Boston Globe

A more than $40 million investment to add advanced nano-fabrication equipment and capabilities to MIT.nano will significantly expand the center’s nanofabrication capabilities, reports Jon Chesto for The Boston Globe. The new equipment, which will also be available to scientists outside MIT, will allow “startups and students access to wafer-making equipment used by larger companies. These tools will allow its researchers to make prototypes of an array of microelectronic devices.”

Forbes

Researchers at MIT have discovered how a new computational imaging algorithm can capture user interactions through ambient light sensors commonly found in smartphones, reports Davey Winder for Forbes. “By combining the smartphone display screen, an active component, with the ambient light sense, which is passive, the researchers realized that capturing images in front of that screen was possible without using the device camera,” explains Winder.

Axios

Axios reporter Ina Fried spotlights a new report by Prof. Emeritus Stuart Madnick that finds “2.6 billion personal records have been exposed in data breaches over the past two years and that number continues to grow.” Additionally, Madnick found that” “Data breaches in the US through the first nine months of the year are already 20% higher than for all of 2022.”

The Wall Street Journal

Prof. Stuart Madnick speaks with Wall Street Journal reporter Seán Captain about how AI could make scamming easier and more dangerous. AI “raises the level of skepticism that we must have substantially,” notes Madnick. “Procedures will have to be put in place to validate the authenticity of who you are dealing with.”

Nature

Prof. Peter Shor has been named one of the winners of the 2023 Breakthrough Prize in Fundamental Physics, reports Nature. “Shor’s most renowned contribution is the development of quantum algorithms for prime number factorization,” writes Nature.

Fortune

Cybersecurity at MIT Sloan has launched a cyberattack prevention course for business leaders, reports Sydney Lake for Fortune. “Board members must be knowledgeable participants in cyber leadership,” says Keri Pearlson, executive director of Cybersecurity at MIT Sloan. “Board members need a set of frameworks, a language, some examples, and actionable insights so they have an independent way to interpret and understand what their organization is doing to be cybersecure.”

Axios

Researchers from Sloan have released a survey “detailing how 600 board directors worldwide view the cyber threats facing their companies,” reports Sam Sabin for Axios. “Competing perceptions of the threat landscape could make it difficult for CISOs to get board members to support their plans for securing their organizations,” writes Sabin.

The New York Times

In a letter to the editor of The New York Times, Michael Coden, associate director at MIT’s Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity,  underscores the importance of cyber-resilience rather than cyberprotection. “In contrast to cyberprotection, cyberresilience anticipates that a cyberattack will succeed. It has in place methods for rapid detection, cushioning the effects and quickly restoring systems to their pre-attack state,” writes Coden.

The Boston Globe

Prof. Peter Shor and three other researchers have won the Breakthrough Prize in Fundamental Physics for their work in the field of quantum information, reports Martin Finucane for The Boston Globe. Shor “invented the first quantum computer algorithm that was clearly useful. Shor’s algorithm can find the factors of large numbers exponentially faster than is thought to be possible for any classical algorithm,” the Breakthrough Foundation noted in its citation.

Forbes

The Breakthrough Prize Foundation has named Prof. Peter Shor one of the four winners for the Breakthrough Prize in Fundamental Physics for his work in the field of quantum information, reports Michael T. Nietzel for Forbes. “The laureates honored today embody the remarkable power of fundamental science,” says Yuri Milner, one of the prize founders. “Both to reveal deep truths about the Universe, and to improve human lives.”

The Guardian

Prof. Peter Shor, an expert in quantum algorithms, has been named one of four recipients for the Breakthrough Prize in Fundamental Physics, reports Ian Sample for The Guardian.

Scientific American

Prof. Peter Shor has been named one of four honorees for this year’s Breakthrough Prize in Fundamental Physics for his contributions to the field of quantum information, reports Daniel Garisto for Scientific American. All of Shor’s work, “led to new views of quantum mechanics and computing,” writes Garisto. 

Nature

Prof. Peter Shor is one of four winners for this year’s Breakthrough Prize in Fundamental Physics, reports Zeeya Merali for Nature. Merali writes that Shor’s research “laid the groundwork for the development of ultra-secure communications and computers that might one day outperform standard machines at some tasks.”