SecurityPrivacyMag (@securityprivacy) 's Twitter Profile
SecurityPrivacyMag

@securityprivacy

IEEE Security & Privacy magazine provides research articles, case studies, tutorials, and columns for the information security industry.

ID: 28637777

linkhttp://computer.org/security calendar_today03-04-2009 19:51:22

975 Tweet

1,1K Followers

201 Following

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

In this edition’s “Off by One” column, read a short story by Tadayoshi (Yoshi) Kohno about a world where our reality mixes with virtual reality to produce dangerous consequences IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

Curious how child privacy protection policies differ across smart devices, and across countries? Read a new analysis of smart speaker privacy protections in China and the US: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

In the age of big data, it is essential to keep personal data secure from entities like malevolent adversaries, social networking sites, and privacy-transgressing employees. Read some proposed guidelines from researchers at Gachon University: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

When it comes to protecting the privacy of smart device users, children are a particularly vulnerable group. Read about how 6 smart speaker manufacturers across the US and China protect child users, and how they could do better: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

Abdul Majeed and Seong Oun Hwang highlight the shortcomings of syntactic and semantic mechanisms for preserving individuals’ data privacy, and propose new guidelines to improve such technology: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

How private should U.S. census data be? Priyanka Nanayakkara and Jessica Hullman discuss the current debate around census data confidentiality and offer suggestions for adopting formal privacy, in this issue of S&P: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

Researchers from HSLU Hochschule Luzern and Die Mobiliar evaluate automated backup, recovery, and configuration management for real-world use and identify limits for operational technology systems: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

The US Census Bureau’s use of differential privacy is a hotly contested topic. Priyanka Nanayakkara and Jessica Hullman provide an overview of confidentiality conflicts and offer suggestions for researchers and organizations adopting differential privacy: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

“While most IT components are well prepared for automation, OT hard/software is not.” Read on operational technology and IT critical infrastructures: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

Static application security testing (SAST) involves statically examining source code to find security flaws that make applications susceptible to attack. Read about an approach to such analyses using machine learning: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

In this issue of S&P Magazine, read about 10 common pitfalls that can affect the experimental outcomes of AI driven solutions in computer security: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

“Pitfalls come in various forms and flavors, some obvious but others noticeable only with a very cautious eye.” Read more on prevalent pitfalls in AI-driven solutions for computer security: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

“Transient execution attacks are a reminder that the abstractions we use to program computers can differ from what the hardware provides.” Read more on these attacks in this issue of S&P: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

Want to pursue higher education in cybersecurity in Europe? Read this analysis of cybersecurity degree programs across 26 European countries: IEEE Computer Society #IEEECS

SecurityPrivacyMag (@securityprivacy) 's Twitter Profile Photo

Daniel E. Geer, Jr. closes out this issue of S&P Magazine with a piece on the ongoing convergence of biology and artificial intelligence: IEEE Computer Society #IEEECS