Gregory Falco | |
---|---|
Nationality | American |
Occupation(s) | Inventor and researcher |
Academic background | |
Alma mater | Massachusetts Institute of Technology |
Academic work | |
Discipline | Aerospace,Cybersecurity |
Gregory Falco is an American inventor and researcher. Falco is a professor at Cornell University. He is a pioneer in the field of cybersecurity research and its aerospace applications. Falco is the founding chair of IEEE's Standard for Space System Cybersecurity and the NATO Country Project Director for the NATO Science for Peace and Security effort to reroute the internet to space.
Falco earned his B.S. from Cornell University in 2010,M.S. from Columbia University in 2012. and Ph.D.,from the Massachusetts Institute of Technology in 2018. He completed a predoctoral fellowship with the Cyber Security Project at Harvard University. His postdoctoral research was conducted at the Computer Science and Artificial Intelligence Laboratory (CSAIL) at Massachusetts Institute of Technology and at the Cyber Policy Center at Stanford University. Falco's PhD was funded by NASA's Jet Propulsion Laboratory to develop an AI system to automatically enumerate threats to space mission systems. [1]
He began his career at Accenture where he was an executive in the Strategy &Sustainability practice. While at Accenture,he lectured at Columbia University and taught a course on Smart Cities and the Evolution of Sustainability. [2] [3]
In 2016 Falco co-founded the company NeuroMesh Inc. while at the Massachusetts Institute of Technology. [4] He was listed in Forbes 30 Under 30 in Enterprise Technology for contributions to industrial control security with his company,acquired by Meta Platforms in 2022. [5]
In 2021,Falco joined the faculty at Johns Hopkins University as an assistant professor at their Institute for Assured Autonomy. [6] [7] [8] [9] Falco directed the Aerospace ADVERSARY Laboratory at Johns Hopkins University. [10]
In 2023,Falco joined the faculty at Cornell University as an assistant professor in the Sibley School of Mechanical and Aerospace Engineering and Systems Engineering. [11]
Falco's main area of work is aerospace security research. [12] [13] [14]
In 2018,his paper Cybersecurity Principles for Space Systems, which included recommendations to reduce the cyber risk of the emergent commercial space sector and informed the United States Space Policy Directive-5,was published in the Journal of Aerospace Information Systems. [15] His work on the topic titled Job One For Space Force:Space Asset Cybersecurity was published by Harvard's Belfer Center. [16] [17]
In 2022,he published a monograph co-authored with Eric Rosenbach on cyber risk management titled Confronting Cyber Risk:An Embedded Endurance Strategy for Cybersecurity. [18] He was awarded a DARPA Young Faculty Award for his project Orbital Resilient Blockchain Interagent Transaction Service (ORBITS) Architecture:A Resilient,Zero-Trust Architecture for Hosted Payloads and Space Infrastructure as a Service. [19] [20] Falco is a member of the Space Systems Critical Infrastructure Working Group hosted by Cybersecurity and Infrastructure Security Agency. [21]
In 2023,Falco was named the founding chair of the Standard for Space Systems Cybersecurity by the IEEE Standards Association. [22] [23] Falco discussed the 2023 Chinese balloon incident as an aerospace security expert with BBC News,Bloomberg News,Australian Broadcasting Corporation,Channel 4 and Vice Media. [24] [25] [26] [27] His paper WannaFly:An Approach to Satellite Ransomware, the first public documentation for how to ransomware a space vehicle,was published in the 2023 IEEE 9th International Conference on Space Mission Challenges for Information Technology. [28]
In 2024,NATO Science for Peace and Security named Falco the NATO Country Director to lead the development of a Hybrid space and submarine architecture to Ensure Information Security to Telecommunications (HEIST). [29] [30] NATO announced the initiative will "make the internet less vulnerable to disruption by rerouting the flow of information into space in the event that undersea cables are attacked or accidentally severed". [31] The project has been described by Bloomberg News as an "effort to save the internet" and that the "Swedish Navy and Icelandic government are among those interested in using the system". [32] The contract to the United States,Sweden,Iceland and Switzerland involves academia,industry and government agencies and according to the South China Morning Post,the project will cost $2.5M dollars. [33] Falco discussed the 2024 Crowdstrike incident as a cybersecurity and critical infrastructure expert with Associated Press,The Wall Street Journal,The Washington Post,Bloomberg News,ABC News and The Daily Telegraph. [34] [35] [36] [37] [38] [39]
Computer security is the protection of computer software,systems and networks from threats that can lead to unauthorized information disclosure,theft or damage to hardware,software,or data,as well as from the disruption or misdirection of the services they provide.
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud,identity theft,data breaches,computer viruses,scams,and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access,steal sensitive information,disrupt services,and cause financial or reputational harm to individuals,organizations,and governments.
Science for Peace and Security (SPS) is a NATO programme supporting non-military cooperation focused on scientific research,technological innovation and knowledge exchange. The SPS Programme in its current form was established in 2006,building on over 60 years of scientific cooperation at NATO.
Bitdefender is a multinational cybersecurity technology company dual-headquartered in Bucharest,Romania and Santa Clara,California,with offices in the United States,Europe,Australia and the Middle East.
SpiderOak Inc. is a US-based software company focused on satellite cybersecurity.
Mandiant,Inc. is an American cybersecurity firm and a subsidiary of Google. Mandiant received attention in February 2013 when it released a report directly implicating China in cyber espionage. In December 2013,Mandiant was acquired by FireEye for $1 billion,who eventually sold the FireEye product line,name,and its employees to Symphony Technology Group for $1.2 billion in June 2021.
The Indian Computer Emergency Response Team is an office within the Ministry of Electronics and Information Technology of the Government of India. It is the nodal agency to deal with cyber security incidents. It strengthens security-related defence of the Indian Internet domain.
The Cyber Threat Intelligence Integration Center (CTIIC) is a United States federal government agency that operates as a fusion center between intelligence agencies and the private sector for real-time use against cyber attacks. CTIIC was created in the wake of the 2014 cyber attack on Sony in combination with the need to establish a cyber integration center following blocked efforts in Congress that were stymied over liability and privacy concerns of citizens.
Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems,infecting the master boot record to execute a payload that encrypts a hard drive's file system table and prevents Windows from booting. It subsequently demands that the users make a payment in Bitcoin in order to regain access to the system.
The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government,coordinating cybersecurity programs with U.S. states,and improving the government's cybersecurity protections against private and nation-state hackers. Cybersecurity is now considered as important part of individuals and families,as well as organizations,governments,educational institutions and our business. It is essential for families and parents to protect the children and family members from online fraud. The term cyber attack covers a wide variety of actions ranging from simple probes,to defacing websites,to denial of service,to espionage and destruction.
Jack Cable is an American computer security researcher and software developer who currently serves as a Senior Technical Advisor at the Cybersecurity and Infrastructure Security Agency. He is best known for his participation in bug bounty programs,including placing first in the U.S. Department of Defense's Hack the Air Force challenge. Cable began working for the Pentagon's Defense Digital Service in the summer of 2018.
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings,called "flags",which are secretly hidden in purposefully-vulnerable programs or websites. They can be used for both competitive or educational purposes. In two main variations of CTFs,participants either steal flags from other participants or from organizers. A mixed competition combines these two styles. Competitions can include hiding flags in hardware devices,they can be both online or in-person,and can be advanced or entry-level. The game is inspired by the traditional outdoor sport of the same name. CTFs are used as a tool for developing and refining cybersecurity skills,making them popular in both professional and academic settings.
During the prelude to the Russian invasion of Ukraine and the Russian invasion of Ukraine,multiple cyberattacks against Ukraine were recorded,as well as some attacks on Russia. The first major cyberattack took place on 14 January 2022,and took down more than a dozen of Ukraine's government websites. According to Ukrainian officials,around 70 government websites,including the Ministry of Foreign Affairs,the Cabinet of Ministers,and the National and Defense Council (NSDC),were attacked. Most of the sites were restored within hours of the attack. On 15 February,another cyberattack took down multiple government and bank services.
The IT Army of Ukraine is a volunteer cyberwarfare organisation created at the end of February 2022 to fight against digital intrusion of Ukrainian information and cyberspace after the beginning of the Russian invasion of Ukraine on February 24,2022. The group also conducts offensive cyberwarfare operations,and Chief of Head of State Special Communications Service of Ukraine Victor Zhora said its enlisted hackers would only attack military targets.
Kemba Eneas Walden is an American lawyer who served as the acting National Cyber Director in 2023. She joined the Office of the National Cyber Director as its principal deputy in May 2022. Walden was previously assistant general counsel of the Digital Crimes Unit at Microsoft.
The U.S. Ransomware Task Force (RTF),also known as the Joint Ransomware Task Force,is an interagency body that leads the American government's efforts to address the threats of ransomware attacks. It is jointly headed by the Department of Homeland Security’s cyber arm,the Cybersecurity and Infrastructure Security Agency (CISA),and the Federal Bureau of Investigation.
Over the years,the U.S. Defense Advanced Research Projects Agency (DARPA) has conducted a number of prize competitions to spur innovations. A prize competition allows DARPA to establish an ambitious goal,which makes way for novel approaches from the public that might otherwise appear too risky to undertake by experts in a particular discipline.
Rhysida is a ransomware group that encrypts data on victims' computer systems and threatens to make it publicly available unless a ransom is paid. The group uses eponymous ransomware-as-a-service techniques,targets large organisations rather than making random attacks on individuals,and demands large sums of money to restore data. The group perpetrated the notable 2023 British Library cyberattack and Insomniac Games data dump. It has targeted many organisations,including some in the US healthcare sector,and the Chilean army.
A cyberattack is any unauthorized effort against computer infrastructure that compromises the confidentiality,integrity,or availability of its content.
BianLian is a cybercriminal ransomware group based in Russia which target organizations in US,Australia and UK since June 2022. By 2023,the group had exfiltrated the files and encrypted the victim's systems - double-extortion method. In 2023,the group shift to data theft extortion. They use valid Remote Desktop Protocol credentials to gain access to the systems. In 20 November 2024,FBI,United States’Cyber Security and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) released a joint security advisory about BianLian ransomware group.
{{cite web}}
: CS1 maint: numeric names: authors list (link){{cite book}}
: CS1 maint: location missing publisher (link)