Information Protection @ MIT: Your source for securing data
Website provides access to policies, resources, and guides for safeguarding sensitive data at the Institute.
Website provides access to policies, resources, and guides for safeguarding sensitive data at the Institute.
Hosted by CSAIL, event featured discussions on cybersecurity with tech leaders and officials from the NSA and FBI.
LLCipher workshop hosted by the Lincoln Laboratory teaches the mathematics behind cryptography.
New computational imaging method identifies letters printed on first nine pages of a stack of paper.
Network can protect users’ anonymity if all but one of its servers are compromised.
Survey indicates 92.54 percent of companies think the nature of risk is changing due to complexity in the digital economy.
System could make complex analysis practical for programs that import huge swaths of code.
From location data alone, even low-tech snoopers can identify Twitter users’ homes, workplaces.
Winning teams will use grants to advance research in areas including fuel cells, solar-powered desalination, and impacts of electric vehicle charging on the power grid.
Virtual artificial intelligence analyst developed by the Computer Science and Artificial Intelligence Lab and PatternEx reduces false positives by factor of 5.
James Swan and Konstantin Turitsyn are among 160 young scientists and engineers poised to explore new frontiers and inspire a future generation of scholars.
With EU vice president, U.S. secretary of commerce discusses EU-U.S. “Privacy Shield” and launches new policy program.
Hosted by the Computer Science and Artificial Intelligence Laboratory, event featured mixed student teams tackling cybersecurity challenges.
New technology could secure credit cards, key cards, and pallets of goods in warehouses.