Search ASU News stories
Google grant creates AI research paths for underserved studentsTop tech companies like Google say they are eager to encourage women and members of… |
|
Deployment, injury couldn’t keep military member from graduationEditor’s note: This story is part of a series of profiles of notable fall… |
|
Lester Godsey joins ASU as chief information security officerWith a career spanning nearly three decades of professional IT experience, Lester Godsey is back where he first started — serving the community at Arizona State University. As a two-time ASU alum, Godsey began his career as a technology support… |
|
ASU professor honored with prestigious award for being a cybersecurity trailblazerAt first, he thought it was a drill. On Sept. 11, 2001, Gail-Joon Ahn sat in a conference room in Fort Meade, Maryland. The cybersecurity researcher was part of a group that had been invited to a… |
|
DEF CON Academy looks to serve, build communityEvery year, a legion of hackers, programmers, cybersecurity professionals and researchers descend on Las Vegas for the most storied convention in the hacker community: DEF CON. Since 1993, the event has provided a weekendlong… |
|
AI-driven cyberattacks more sophisticated and scalable, but ASU expert offers solutionsCyberattacks used to be engineered by crafty hackers looking to infiltrate computer systems. Artificial intelligence now allows hackers to create a new scale of attacks that penetrate banking, critical infrastructure, intellectual property, and even traffic lights and… |
|
Thunderbird at ASU alum Kimberly Wiehl to deliver keynote at fall convocationKimberly Wiehl, a 1980 graduate of Thunderbird School of Global Management and esteemed expert in the field of international export credit, will deliver the keynote address at the school's fall 2024 convocation. With a career of enduring impact across many countries and… |
|
Meet 3 ASU cybersecurity researchers advancing a more secure futureCybersecurity isn’t just about fighting the bad guys through your devices. It is a field of study that, for example, can ensure autonomous cars stay on the road, and prevent our social media posts from being exploited and our hospital records from being accessed by… |
|
Seeking the biometric bill of rightsKatina Michael warns that your DNA data may not be as safe as you think. In some cases, consumer genetic testing companies, such as those that specialize in decoding ancestry, are not bound by federal… |
|
Training stellar students to secure semiconductorsIn the wetlands of King’s Bay, Georgia, the sail of a nuclear-powered Trident II Submarine laden with sophisticated computer equipment juts out of the marshy waters… |