Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

3/11/2016
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Former New York City Mayor Rudolph Giuliani to Visit Ben-Gurion University of the Negev as New Global Chairman of Greenberg Traurig Cyber Security Practice

Former New York City Mayor Rudolph Giuliani to Visit Ben-Gurion University of the Negev as New Global Chairman of Greenberg Traurig Cyber Security Practice


BEER-SHEVA, Israel, March 13, 2016 – Former New York City Mayor Rudolph Giuliani will meet with Prime Minister Benjamin Netanyahu before attending a series of briefings with Israel’s top cyber security researchers at Ben-Gurion University of the Negev (BGU) on Tuesday, March 15.

Giuliani recently joined the law firm Greenberg Traurig LLP as its new global chairman of cyber security and crisis management practice. He is visiting BGU and Beer-Sheva’s Advanced Technologies Park to meet with researchers and startup firms at Israel’s new cyber security hub.

As mayor of New York City from 1994 to 2001, Giuliani is credited with reducing crime and handling the aftermath of the 9/11 terror attacks on the World Trade Center. Following that, he founded Giuliani Partners, a security consulting firm.

At BGU on Tuesday, he will visit with experts from the University’s Cyber Security Research Center and Deutsche Telekom Innovation [email protected], and with the president of the University, Prof. Rivka Carmi. He will also deliver a speech to students on “The International Aspects of the Cyber Threat.”
Giuliani will also be meeting with Prof. Dan Blumberg, BGU vice president and dean for research and development and director of BGU’s Homeland Security Institute; Prof. Bracha Shapira, Deutsche Telekom Innovation [email protected] and Cyber Security Research Center; Yoav Tzruya, partner and head, JVP Cyber Labs; and Dr. Nimrod Kozlovski, venture partner, JVP Cyber Labs.

Giuliani is visiting BGU in part on the recommendation of his partner at Greenberg Traurig, Shira Yoshor. She is on the board of American Associates, Ben-Gurion University of the Negev Greater Texas Region.

About Telekom Innovation [email protected]
Ben-Gurion University has been collaborating with Telekom Innovation Laboratories in the field of network security since 2004. The close and fruitful cooperation between the two institutions led to the signing of an agreement for the founding of Telekom Innovation Laboratories at Ben-Gurion University, the only such venture with Deutsche Telekom outside of Germany. Here, leading scientists collaborate with Telekom Innovation experts to translate their visions for the future design of information technology and telecommunications into reality. In this way, Telekom Innovation Laboratories pools the know-how of Deutsche Telekom AG with the expertise of some of the world's top research scientists at BGU. Telekom Innovation Laboratories serves as a crystallization point, where cutting-edge knowledge is boldly transformed into revolutionary technologies of the future. See more at http://tlabs.bgu.ac.il/

About American Associates, Ben-Gurion University of the Negev
American Associates, Ben-Gurion University of the Negev (AABGU) plays a vital role in sustaining David Ben-Gurion's vision, creating a world-class institution of education and research in the Israeli desert, nurturing the Negev community and sharing the University's expertise locally and around the globe. With some 20,000 students on campuses in Beer-Sheva, Sede Boqer and Eilat in Israel’s southern desert, BGU is a university with a conscience, where the highest academic standards are integrated with community involvement, committed to sustainable development of the Negev. AABGU is headquartered in Manhattan and has nine regional offices throughout the United States. For more information, visit www.aabgu.org 
 

 

 

 

Contact:

Andrew Lavin

A. Lavin Communications
516-944-4486
[email protected]

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32094
PUBLISHED: 2021-05-07
U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to upload arbitrary files.
CVE-2021-32095
PUBLISHED: 2021-05-07
U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to delete arbitrary files.
CVE-2021-32096
PUBLISHED: 2021-05-07
The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter.
CVE-2021-32098
PUBLISHED: 2021-05-07
Artica Pandora FMS 742 allows unauthenticated attackers to perform Phar deserialization.
CVE-2021-32099
PUBLISHED: 2021-05-07
A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass.