Salvatore Stolfo

Opinions expressed by ICN authors are their own.

Salvatore Stolfo is a tenured Columbia University professor, teaching computer science since 1979. He is the co-founder and CTO of Allure Security, a DARPA-funded cybersecurity startup specializing in data protection and the prevention of data breaches.

Dr. Stolfo is a people-person. And that makes him unique in a field where folks focus on making machines. As professor of artificial intelligence at Columbia University, Dr. Stolfo has spent a career figuring out how people think and how to make computers and systems think like people. Early in his career he realized that the best technology adapts to how humans work, not the other way around.

Dr. Stolfo has been granted over 75 patents and has published over 230 papers and books in the areas of parallel computing, AI knowledge-based systems, data mining, computer security and intrusion detection systems. His research has been supported by numerous government agencies, including DARPA, NSF, ONR, NSA, CIA, IARPA, AFOSR, ARO, NIST, and DHS.

See his full academic bio at Columbia University for more background.

The opinions expressed in this blog are those of Salvatore Stolfo and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Attacker attribution is hard, but sometimes easier than you think

“Political hack” takes on new meaning in the age of cyberwarfare

“Political hack” takes on new meaning in the age of cyberwarfare

Political hacking is a real and present danger, but more advanced detection and response capabilities will help defend our democratic institutions better than what is current practice.

The ostrich security strategy is now very risky

The ostrich security strategy is now very risky

Ignorance of a serious security event is unreasonable, and just like ignorance of the law, it is no defense.

Third-party risk: it’s the second hop you should fear

Third-party risk: it’s the second hop you should fear

Third-party risk is a persistent fear for CISOs and risk compliance officers especially, with GDPR potentially piercing corporate non-disclosure agreements. Loss of sensitive data from a third party is often managed using protective...

IBM and thumb drives: epoxy or beacons?

IBM and thumb drives: epoxy or beacons?

Banning thumb drives and removable media will not stop the loss of sensitive data files. Beacons that track the content of thumb drives is far more sensible to reduce data loss.

Rights management and the GDPR: users are still in the loop

Rights management and the GDPR: users are still in the loop

Using Information Rights Management (IRM) to manage the General Data Protection Regulation (GDPR).

Best of breed: how secure are you, really?

Best of breed: how secure are you, really?

If everyone claims to be the best, how can we rationally choose what we will deploy?

The life and death of a document: where did it really go?

The life and death of a document: where did it really go?

As the Moody Blues would say, what became of that letter you never meant to send?

Are you you?

Are you you?

Are insiders really threats or part of the solution?

Load More