Georgia Tech launches the Cybersecurity Leadership Program – a new effort to educate the C-suite about how to fortify their enterprise and protect data
Dimitri Alperovitch, Georgia Tech alum (MS INFO ’03), co-founder & chief technology officer, CrowdStrike Inc.
Georgia Tech professor Manos Antonakakis
Teresa Shea, exec VP & Dir of Cyber Reboot, In-Q-Tel & former director of Signals Intelligence at the National Security Agency
Ret. Admiral James A. Winnefeld, Jr., frmr vice chair of the Joint Chiefs of Staff & Prof of practice in Georgia Tech’s School of International Affairs
Marcus Christian, partner, Mayer Brown Washington DC
Russell Eubanks, vice president, chief information security officer, Federal Reserve Bank of Atlanta
Bill Ide, partner, Dentons
Mary Kepler, senior vice president, risk and compliance officer, Federal Reserve Bank of Atlanta
Chris Kirchhoff, Director for Strategic Planning, National Security Council
Catherine A. Mulligan, senior vice president and head of professional liability, Zurich
Thomas E. Noonan, Georgia Tech alum (ME ’83) partner, TechOperators LLC and chairman, TEN Holdings LLC
Georgia Tech professors Mustaque Ahamad, Joseph R. Bankoff, Raheem Beyah, Hans Klein, Wenke Lee, Milton Mueller, Alessandro Orso, Michael Salomone, and Peter Swire
Georgia Tech research scientists Michael Farrell, Jimmy Lummis, and associates Chris McDermott and Tarun Chaudhary
25-29 July 2016
Georgia Tech’s intensive, four-day program addresses cybersecurity risks and the policy, legal, and human dimensions that senior executives need to master to proactively manage, evaluate, and respond to cybersecurity threats.
DoJ has secretly filed criminal charges against the WikiLeaks founder, Julian Assange, a person familiar with the case said, a drastic escalation of the government’s yearslong battle with him and his anti-secrecy group.
Top DoJ officials told prosecutors over the summer that they could start drafting a complaint against Assange, current and former LEOs said. The charges came to light late Thursday through an unrelated court filing in which prosecutors inadvertently mentioned them.
“The court filing was made in error,” said Joshua Stueve, a spokesman for the United States attorney’s office for the Eastern District of Virginia. “That was not the intended name for this filing.”
On a wall of fame for stars of the Chinese company were several former employees of Nortel, the Canadian telecommunications giant that suffered a spectacular collapse a decade ago.
“These are (now) Huawei employees associated with great tech accomplishments … & I recognized so many of them,” said Calof, a U. of Ottawa business prof visiting the site w/ MBA students. “At one level you’re proud to be a Canadian, at the same time you’re upset to be Canadian”
The ex-Nortel engineers’ place of honour in Shenzhen underscores how the two companies’ fortunes unfurled for years in striking parallel, and yet with starkly different outcomes.
The defense contractor investigated in 2012 after cellphone videos surfaced of its employees drunk and high on drugs in Afghanistan may have misused almost $135 million of U.S. taxpayer money, an audit finds.
A financial audit done on behalf of the independent Special Inspector General for Afghanistan Reconstruction (SIGAR) alleges Imperatis Corp, formerly Jorge Scientific Corp, couldn’t produce docs to show payments to a subcontractor were allowed under its contract w/ the Army
The IG report, released in April, said either Imperatis should produce the appropriate documents “to demonstrate that the costs invoiced and paid were allowable…” or refund the money to government.
Before the 2016 election, a longtime Republican opposition researcher mounted an independent campaign to obtain emails he believed were stolen from Hillary’s private server.
In conversations with members of his circle and with others he tried to recruit to help him, the GOP operative, Peter W. Smith, implied he was working with retired Lt. Gen. Mike Flynn, at the time a senior adviser to then-candidate Donald Trump.
“He said, ‘I’m talking to Michael Flynn about this—if you find anything, can you let me know?’” said Eric York, a computer-security expert from Atlanta who searched hacker forums on Mr. Smith’s behalf for people who might have access to the emails.
Bloomberg is resurrecting the Super Micro spy chip story it first ran in 2018. The original story was met with blanket and unambiguous denials from everyone from Apple to the NSA
Today’s update claims that spy chips were found in Super Micro servers at the US Department of Defense
October 2018
Bloomberg published a report claiming that companies including Amazon & Apple found Chinese surveillance chips in their server hardware contracted from Super Micro
Apple found these chips on its server motherboards in 2015. Apple is strongly refuting this report, sending out press statements to several publications, not just Bloomberg.