Keylime security software is deployed to IBM cloud
Originally developed at MIT Lincoln Laboratory, the technology allows organizations to ensure the security of sensitive data stored in the cloud.
Originally developed at MIT Lincoln Laboratory, the technology allows organizations to ensure the security of sensitive data stored in the cloud.
Nearly 300 government and military members participated in a new course designed to explore the next generation of artificial intelligence and related technologies.
Algorand uses a unique architecture developed by MIT Professor Silvio Micali to offer a decentralized, secure, and scalable blockchain.
Society for Industrial and Applied Mathematics recognizes Kepner, a pivotal member of the team that established Lincoln Laboratory's Supercomputing Center, for his innovative work in computing.
An innovative approach protects closed-source Windows applications against cyber attacks by automatically and transparently re-randomizing sensitive internal data.
New model shows why countries that retaliate too much against online attacks make things worse for themselves.
The systems engineer focuses on making transportation, electricity, and water infrastructure more resilient against disruptions.
Several of the winning innovations apply artificial intelligence to solutions for challenges to national security.
By securely aggregating sensitive data from cyber-attacks, the SCRAM platform from MIT CSAIL can quantify an organization’s level of security and suggest what to prioritize.
Approach for generating numbers at random may help analyses of complex systems, from Earth’s climate to financial markets.
Smith spoke with CSAIL Director Daniela Rus as part of a special series co-presented by the MIT Schwarzman College of Computing.
A system that enables smartphones to transmit “chirps” to nearby devices could notify people if they have been near an infected person.
MIT cryptography expert and election technology developer explains how to verify an election outcome.
System ensures hackers eavesdropping on large networks can’t find out who’s communicating and when they’re doing so.
PatternEx merges human and machine expertise to spot and respond to hacks.