In its efforts to curb criminal activity, should the government be allowed to see confidential consumer data collected by businesses? Or does the right to privacy trump such intrusions? These complex questions will be the focus of the second annual Senior Executive Cyber Security Conference, to be held Thursday, Sept. 10, at Johns Hopkins University. Registration for the daylong event is under way.
Recent news from The Johns Hopkins University
This section contains regularly updated highlights of the news from around The Johns Hopkins University. Links to the complete news reports from the nine schools, the Applied Physics Laboratory and other centers and institutes are to the left, as are links to help news media contact the Johns Hopkins communications offices.
At a time when cybersecurity attacks are more frequent and damaging, the National Science Foundation has awarded $2.2 million to the Johns Hopkins University Information Security Institute to support a graduate-level degree program that teaches students how to recognize and protect against digital threats. The grant will be allocated over five years as part of the Federal CyberCorps: Scholarship for Service Program.
The Johns Hopkins University has entered into a partnership agreement with Google’s Advanced Technology and Projects (ATAP) group, aimed at speeding up the development of new technology and moving the resulting products toward the marketplace more quickly. The agreement, approved recently by both parties, will enable ATAP to draw on the expertise of Johns Hopkins computer scientists and other experts, and approve funds for joint technology projects in as little as 30 days. That turnaround time is much shorter than the period usually required for obtaining grants from governments agencies and private organizations.
Johns Hopkins computer scientists have found a flaw in the way that secure cloud storage companies protect their customers’ data. The scientists say this weakness jeopardizes the privacy protection these digital warehouses claim to offer. Whenever customers share their confidential files with a trusted friend or colleague, the researchers say, the storage provider could exploit the security flaw to secretly view this private data.