Operations
3/11/2016
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Former New York City Mayor Rudolph Giuliani to Visit Ben-Gurion University of the Negev as New Global Chairman of Greenberg Traurig Cyber Security Practice

Former New York City Mayor Rudolph Giuliani to Visit Ben-Gurion University of the Negev as New Global Chairman of Greenberg Traurig Cyber Security Practice


BEER-SHEVA, Israel, March 13, 2016 – Former New York City Mayor Rudolph Giuliani will meet with Prime Minister Benjamin Netanyahu before attending a series of briefings with Israel’s top cyber security researchers at Ben-Gurion University of the Negev (BGU) on Tuesday, March 15.

Giuliani recently joined the law firm Greenberg Traurig LLP as its new global chairman of cyber security and crisis management practice. He is visiting BGU and Beer-Sheva’s Advanced Technologies Park to meet with researchers and startup firms at Israel’s new cyber security hub.

As mayor of New York City from 1994 to 2001, Giuliani is credited with reducing crime and handling the aftermath of the 9/11 terror attacks on the World Trade Center. Following that, he founded Giuliani Partners, a security consulting firm.

At BGU on Tuesday, he will visit with experts from the University’s Cyber Security Research Center and Deutsche Telekom Innovation [email protected], and with the president of the University, Prof. Rivka Carmi. He will also deliver a speech to students on “The International Aspects of the Cyber Threat.”
Giuliani will also be meeting with Prof. Dan Blumberg, BGU vice president and dean for research and development and director of BGU’s Homeland Security Institute; Prof. Bracha Shapira, Deutsche Telekom Innovation [email protected] and Cyber Security Research Center; Yoav Tzruya, partner and head, JVP Cyber Labs; and Dr. Nimrod Kozlovski, venture partner, JVP Cyber Labs.

Giuliani is visiting BGU in part on the recommendation of his partner at Greenberg Traurig, Shira Yoshor. She is on the board of American Associates, Ben-Gurion University of the Negev Greater Texas Region.

About Telekom Innovation [email protected]
Ben-Gurion University has been collaborating with Telekom Innovation Laboratories in the field of network security since 2004. The close and fruitful cooperation between the two institutions led to the signing of an agreement for the founding of Telekom Innovation Laboratories at Ben-Gurion University, the only such venture with Deutsche Telekom outside of Germany. Here, leading scientists collaborate with Telekom Innovation experts to translate their visions for the future design of information technology and telecommunications into reality. In this way, Telekom Innovation Laboratories pools the know-how of Deutsche Telekom AG with the expertise of some of the world's top research scientists at BGU. Telekom Innovation Laboratories serves as a crystallization point, where cutting-edge knowledge is boldly transformed into revolutionary technologies of the future. See more at http://tlabs.bgu.ac.il/

About American Associates, Ben-Gurion University of the Negev
American Associates, Ben-Gurion University of the Negev (AABGU) plays a vital role in sustaining David Ben-Gurion's vision, creating a world-class institution of education and research in the Israeli desert, nurturing the Negev community and sharing the University's expertise locally and around the globe. With some 20,000 students on campuses in Beer-Sheva, Sede Boqer and Eilat in Israel’s southern desert, BGU is a university with a conscience, where the highest academic standards are integrated with community involvement, committed to sustainable development of the Negev. AABGU is headquartered in Manhattan and has nine regional offices throughout the United States. For more information, visit www.aabgu.org 
 

 

 

 

Contact:

Andrew Lavin

A. Lavin Communications
516-944-4486
[email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.