Archive (Page 1 of 2)

2013 Internet Hall of Fame Interviews: Steve Goldstein

There was real­ly no real secu­ri­ty built, oth­er than things like pass­words and maybe some encryp­tion here or there. And the atti­tude that my boss had at National Science Foundation was, That’s not our con­cern. This is for the aca­d­e­mics. People want to build in all kinds of secu­ri­ty, that’s some­body else’s prob­lem.” I think that was a very valid point at that time, but that was 1990.

2013 Internet Hall of Fame Interviews: James Galvin

The great­est threat to the secu­ri­ty and sta­bil­i­ty of our Internet today is dis­trib­uted attacks, dis­trib­uted denial of ser­vice attacks in par­tic­u­lar. The Internet was built on a foun­da­tion of it works because every­body coop­er­ates and we all agree. And that was a great envi­ron­ment when you pret­ty much could name every­body who was on the Internet, or you got to where you could name all the sites and you know, you could name all the organizations.

2013 Internet Hall of Fame Interviews: Ralph Droms

We’re at a time of huge expan­sion of the Internet out­side of the kinds of Internet con­nec­tions and devices that we’re famil­iar with. We’ve seen some of that over the past few years as we’ve moved from lap­tops, desk­top com­put­ers, to smart­phones and tablets and we’ve seen a big increase. Right now instead of a tablet and a lap­top at home, you’ve got a tablet, two iPhones, and a desk­top computer. 

Internet Hall of Fame 2019 Induction Speech on Behalf of Suguru Yamaguchi

I was born in 1999. Some peo­ple like to call my gen­er­a­tion the Internet experts. For us, the Internet exist­ed from the moment we were born. And its safe­ty was tak­en for grant­ed. However, this is all due to the work of my father and his allies speak­ing to the world, telling them secu­ri­ty on the Internet is going to be high­ly impor­tant fif­teen years before I was even born.

Deepfakes, Deep Trouble
Analyzing the Potential Impact of Deepfakes on Market Manipulation

Deepfakes, even as a con­cept, con­tin­ue to grow and devel­op. So we’re not see­ing that just what we know now as deep­fakes is where it stops. This is going to con­tin­ue to devel­op as time goes by.

Bob Lord Misinformation Keynote at DEF CON 27

I’m pret­ty ner­vous about the 2020 elec­tions. We’ve seen a lot of lit­tle deep­fakes here and there. And I sus­pect it’s not going to sur­prise you to say that I’m wor­ried that things are going to get far far worse and far more nuanced.

ASU KEDtalks: Solving the Unsolvable Problem

Today we face many high­ly com­plex chal­lenges both nation­al­ly and inter­na­tion­al­ly. From secu­ri­ty of our infor­ma­tion net­works, to plan­ning for and man­ag­ing nat­ur­al dis­as­ters, to emer­gence of new infec­tious dis­eases, to social and polit­i­cal con­flict through­out the world, these chal­lenges are messy, and high­ly interconnected.

ASU KEDtalks: Staying Ahead of Cyberattacks

What if cyber attacks could be pre­dict­ed? What if before a major attack occurred, we would know pre­cise­ly the right pre­cau­tions to take?

Geek of the Week: Steve Crocker

The inter­est­ing phe­nom­e­non relat­ed to the RSA algo­rithm and is not shared with some of the oth­er algo­rithms is it is use­ful for both encryp­tion and for dig­i­tal sig­na­ture. That is they are two dis­tinct uses and this sin­gle algo­rithm is use­ful for both of those. And there’s an amaz­ing and some­what inter­est­ing sto­ry that then devel­ops from that.

Projecting the Future of Cyberspace

What we’re try­ing to do is to see over the hori­zons, look­ing at essen­tial­ly a five-year time frame, and iden­ti­fy what will be the cyber­se­cu­ri­ty land­scape in that context.

Page 1 of 2