William Robertson Associate Professor of Computer Science w.robertson@neu.edu 617.373.2136 Expertise cyber and systems security, detecting and preventing web based attacks, information assurance William Robertson in the Press Beyoncé is going on tour. Is Ticketmaster ready? It “will give Ticketmaster a chance to respond to problems that arise in the initial rollout,” said William Robertson, an associate professor of computer science at Northeastern University, noting that the company will also use technology to weed out bots. Network World Researchers add software bugs to reduce the number of… software bugs Researchers are adding bugs to experimental software code in order to ultimately wind up with programs that have fewer vulnerabilities. The idea is to insert a known quantity of vulnerabilities into code, then see how many of them are discovered by bug-finding tools. By analyzing the reasons bugs escape detection, developers can create more effective […] Forensics Colleges 15 Top Cyber Security Professors Dr. William Robertson Northeastern University An associate professor at Northeastern University, Dr. William Robertson is affiliated both with the College of Computer and Information Science and The College of Engineering. His interests include anomaly detection, program analysis, security of electronic voting, and Web security. He’s had many conference papers published and articles that have been included in […] William Robertson for Northeastern Global News Your Capital One account was hacked. There was nothing you could have done about it. Your Capital One account was hacked. There was nothing you could have done about it. The personal information of more than 100 million banking customers was stolen by a software engineer in Seattle. Capital One has fixed this problem, but a solution to the epidemic of online breaches remains out of reach, says William Robertson, an associate professor in the Khoury College of Computer Sciences. Why politically motivated cyberattacks might be the new normal Why politically motivated cyberattacks might be the new normal An international ransomware attack struck parts of Europe, Asia, and the United States on Tuesday, crippling tens of thousands of computers at banks, hospitals, and government offices worldwide. We asked three experts at Northeastern—Carla Brodley, John Manferdelli, and Wil Robertson— to discuss the motivation behind the attack, the challenges of stopping future attacks, and the efficacy of giving in to hackers’ demands. 3Qs: Could cyberattacks threaten to steal the 2016 election? 3Qs: Could cyberattacks threaten to steal the 2016 election? Exactly how likely is it that hostile agents might rig the 2016 election? We asked William Robertson, associate professor and cybersecurity expert, to weigh in on the feasibility of such an attack. Looking ahead: Cybersecurity in 2015 Looking ahead: Cybersecurity in 2015 U.S. businesses suffered a score of data breaches in 2014. Here, William Robertson, an assistant professor and web security expert, explains what we can expect from cybersecurity in the new year. 3Qs: The rules of cyber-engagement 3Qs: The rules of cyber-engagement Professor and cybersecurity expert Wil Robertson discusses the impact of new measures the Obama administration is reportedly taking to combat cyberattacks and the challenges federal officials face in recruiting cyberspecialists. Northeastern receives $4.5M award to train future cybersecurity workforce Northeastern receives $4.5M award to train future cybersecurity workforce Students in the information assurance program will receive training in both the technical sciences and the humanities through a scholarship program. 3Qs: Fortifying the country’s mainframe 3Qs: Fortifying the country’s mainframe Assistant professor and cybersecurity expert Wil Robertson explains the growing threat of hackers targeting American military and infrastructure. Northeastern security expert testifies at congressional hearing Northeastern security expert testifies at congressional hearing The cybersecurity threat represents one of the nation’s most serious economic and national security challenges, said Stephen Flynn, the founding co-director of Northeastern’s George J. Kostas Research Institute for Homeland Security, in a hearing on Tuesday afternoon in Washington, D.C. “Our position as the world’s dominant economic power can be attributed in no small part […] 3Qs: How hacking will affect credit-card holders 3Qs: How hacking will affect credit-card holders Last Friday, a major Atlanta-based payment card processor, Global Payments, announced a server security breach that could affect more than 1 million accounts. We asked William Robertson, a cybersecurity expert and professor in both the College of Computer and Information Science and the College of Engineering, to explain how hackers penetrated the company and the […] Northeastern leads congressional briefing on cybersecurity Northeastern leads congressional briefing on cybersecurity On Wednesday, university experts examined how to combat cyberthreats facing America, as lawmakers are considering cybersecurity legislation.
Beyoncé is going on tour. Is Ticketmaster ready? It “will give Ticketmaster a chance to respond to problems that arise in the initial rollout,” said William Robertson, an associate professor of computer science at Northeastern University, noting that the company will also use technology to weed out bots.
Network World Researchers add software bugs to reduce the number of… software bugs Researchers are adding bugs to experimental software code in order to ultimately wind up with programs that have fewer vulnerabilities. The idea is to insert a known quantity of vulnerabilities into code, then see how many of them are discovered by bug-finding tools. By analyzing the reasons bugs escape detection, developers can create more effective […]
Forensics Colleges 15 Top Cyber Security Professors Dr. William Robertson Northeastern University An associate professor at Northeastern University, Dr. William Robertson is affiliated both with the College of Computer and Information Science and The College of Engineering. His interests include anomaly detection, program analysis, security of electronic voting, and Web security. He’s had many conference papers published and articles that have been included in […]