Cloud computing, cybersecurity, and the Internet of Things

Pres­i­dent Joseph E. Aoun on Thursday hosted EMC Cor­po­ra­tion CEO and Chairman Joseph Tucci and Amit Yoran, pres­i­dent of RSA, EMC’s secu­rity divi­sion, for an engaging dis­cus­sion about trends in high tech.

Raytheon CEO: cybersecurity must be a top priority for businesses

Cyber­se­cu­rity is now some­thing that we must treat in our busi­nesses just like we watch our bal­ance sheets,” Thomas A. Kennedy, chairman and CEO of Raytheon Com­pany, said Tuesday morning as the keynote speaker at North­eastern University’s CEO Break­fast Forum.

Northeastern secures $20 million agreement with US Army to conduct critical defense research

The $20.4 mil­lion coop­er­a­tive agree­ment pro­vides a unique mech­a­nism for North­eastern to obtain expe­dited funding for research in designing and devel­oping advanced engi­neered mate­rials with secu­rity appli­ca­tions, and expands on the university’s lead­er­ship in secu­rity and resilience research.

Congressman tours Northeastern’s Kostas Research Institute for Homeland Security

U.S. Rep. Seth Moulton received a com­pre­hen­sive overview of Northeastern’s robust port­folio of secu­rity research on Thursday after­noon and under­scored the impor­tance of pro­viding research funding in this area.

Research, entrepreneurship at Northeastern celebrated at RISE:2015

Stu­dents and fac­ulty across many dis­ci­plines pre­sented their schol­arly research, inno­v­a­tive thinking, and entre­pre­neurial endeavors at the annual expo, where many young researchers were hon­ored with pres­ti­gious awards.

Looking ahead: Cybersecurity in 2015

U.S. busi­nesses suf­fered a score of data breaches in 2014. Here, William Robertson, an assis­tant pro­fessor and web secu­rity expert, explains what we can expect from cyber­se­cu­rity in the new year.

Researchers aim to thwart targeted cyberattacks

North­eastern cyber­se­cu­rity expert Engin Kirda and his col­leagues have pro­duced ground­breaking research that sheds light on tar­geted attacks, which rep­re­sent the growing majority of cyberes­pi­onage world­wide taking place today.

How to secure the cloud

With sup­port from the National Sci­ence Foun­da­tion, cryp­tog­raphy expert Daniel Wichs, an assis­tant pro­fessor in the Col­lege of Com­puter and Infor­ma­tion Sci­ence, will work as part of a multi-​​university team to develop better encryp­tion tech­niques to improve cloud security.

3Qs: Who’s got your digital dossier?

North­eastern mobile sys­tems expert David Choffnes says data bro­kering, in which the data we share online is bought and sold by third par­ties, has blos­somed into a viable industry and is the reason many pop­ular apps are free. But he says the average user knows little about how their per­sonal infor­ma­tion is shared.

New tools to get your smartphone up to speed

Dave Choffnes, an assis­tant pro­fessor in the Col­lege of Com­puter and Infor­ma­tion Sci­ence, is devel­oping pro­grams that incen­tivize smart­phone users to share their data in order to improve the mobile Internet expe­ri­ence while still pro­tecting their privacy.

Take 5: How to protect your passwords

Not using the same pass­word for every­thing is among sev­eral tips North­eastern cyber­se­cu­rity expert Wil Robertson sug­gests to help Internet users guard their per­sonal infor­ma­tion online.