Stephen T. Cobb

Last updated

Stephen Cobb
Stephen Cobb 2019.png
Cobb in 2019
Born (1952-10-17) 17 October 1952 (age 71)
Coventry, England
NationalityUK and US
EducationUniversity of Leeds, University of Leicester, U.K.
Occupation Researcher
SpouseChey Cobb
RelativesMichael 'Mike' Cobb
Website Cobbs Security Blog

Stephen Cobb is an expert on security, privacy, and the risks related to digital technology. [1]

Contents

Widely published as a technical author in the 1980s, Cobb became known for his efforts to educate consumers and companies in data privacy and information security. In 1996, Cobb became one of the first people to earn the Certified Information System Security Professional (CISSP) qualification. He later co-founded two information security startups, one of which developed innovative anti-spam technology that is still in use today (both firms were sold to NASDAQ listed companies). [2] Cobb has been cited as an information security expert by national media and in congressional testimony. [3] Since September 2019, he has been pursuing independent research from the city of Coventry, in England, where he was born and raised.

Written work

After authoring more than a dozen textbooks during the 1980s on how to use software applications like spreadsheets, databases, and word processors, mostly through McGraw Hill Cobb's first book on PC and LAN Security was published in 1991. [4] In 2002, Cobb published a primer on privacy for businesses. [5] As co-author and editor of the Trusted Email Open Standard Cobb helped present this proposal for securing email to the Federal Trade Commission in 2003. After a brief hiatus from privacy and security research, during which he produced an independent documentary on racial inequality in America (Dare Not Walk Alone, 2006), Cobb co-authored a peer-reviewed paper on the dangers of malicious code use by governments, which he termed "righteous malware". [6] Published by IEEE, the paper was presented by Cobb at NATO CCDCOE's CyCon 2014, the 6th International Conference On Cyber Conflict. Cobb's historical analysis of cybercrime surveys was presented at Virus Bulletin 2015. [7]

Entrepreneurial activities

Cobb co-founded two information security startups that were sold to NASDAQ listed companies. The first was InfoSec Labs, acquired in 1999 by Rainbow Technologies, a maker of encryption products such as the CryptoSwift Hardware Security Module (HSM). The second was ePrivacy Group, the company that created the TurnTide anti-spam technology. [8] This technology was acquired by Symantec in 2004 was still in use a decade later as the Symantec Traffic Shaper. [9]

Security awareness and education

Cobb served for four years on the IT Security Executive Council of CompTIA (2012-2015). He frequently worked with Security Our eCity, a non-profit community-wide security awareness organization based in San Diego. [10] In that role, he helped organize an annual Cyber Boot Camp for middle school and high school students that received national attention. [11] Cobb has been an invited speaker on information security and data privacy issues in a dozen countries. [12] He is also a TEDx speaker. [13] Cobb's dissertation for his Master of Science degree in security and risk management at the University of Leicester addressed aspects of the cybersecurity skills gap. [14]

As a security researcher with ESET, Cobb tracked the effects of security breaches on economic activity. For example, in the wake of the Snowden revelations he documented a drop in online shopping and banking. [15] In 2018 he fielded a public opinion survey in North America that paralleled prior studies conducted by the European Union (EU), published as the “Special Eurobarometer: Cyber Security.” This revealed that nine out of 10 Americans surveyed agreed that cybercrime was “an important challenge to the internal security of the USA." [16] The study also revealed high levels of concern about cybercrime in Canada. [17]

In an effort to spread awareness of emerging threats Cobb has coined words for two related digital security problems: jackware and siegeware. He described jackware as "ransomware meets car jacking." [18] Siegeware is "the code-enabled ability to make a credible extortion demand based on digitally impaired building functionality." [19]

Awards

In 2019, CompTIA presented Cobb with the Tech Champion Award for Industry. [20] The Tech Champion Awards are presented to "leaders focused on driving innovation, job growth and advancements for the information technology (IT) industry." [21] Previous Tech Champion Award recipients include U.S. Senator Cory Booker [22] and U.S. Representative Anna Eshoo. [23]

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security is the protection of computer software, systems and networks from threats that may result in unauthorized information disclosure, theft of hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">ESET</span> Slovak internet security company

ESET, s.r.o., is a software company specializing in cybersecurity. ESET's security products are made in Europe and provides security software in over 200 countries and territories worldwide. Its software is localized into more than 30 languages.

The Australian High Tech Crime Centre (AHTCC) are hosted by the Australian Federal Police (AFP) at their headquarters in Canberra. Under the auspices of the AFP, the AHTCC is party to the formal Joint Operating Arrangement established between the AFP, the Australian Security Intelligence Organisation and the Computer Network Vulnerability Team of the Australian Signals Directorate.

Ransomware is a type of cryptovirological malware that permanently blocks access to the victim's personal data unless a "ransom" is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem, and difficult-to-trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

Brian Krebs is an American journalist and investigative reporter. He is best known for his coverage of profit-seeking cybercriminals. Krebs is the author of a daily blog, KrebsOnSecurity.com, covering computer security and cybercrime. From 1995 to 2009, Krebs was a reporter for The Washington Post and covered tech policy, privacy and computer security as well as authoring the Security Fix blog.

<span class="mw-page-title-main">Malwarebytes</span> Internet security company

Malwarebytes Inc. is an American Internet security company that specializes in protecting home computers, smartphones, and companies from malware and other threats. It has offices in Santa Clara, California; Clearwater, Florida; Tallinn, Estonia; Bastia Umbra, Italy; and Cork, Ireland.

Recorded Future is a privately held cybersecurity company founded in 2009, with headquarters in Somerville, Massachusetts.

Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, identity theft, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

There is no commonly agreed single definition of “cybercrime”. It refers to illegal internet-mediated activities that often take place in global electronic networks. Cybercrime is "international" or "transnational" – there are ‘no cyber-borders between countries'. International cybercrimes often challenge the effectiveness of domestic and international law, and law enforcement. Because existing laws in many countries are not tailored to deal with cybercrime, criminals increasingly conduct crimes on the Internet in order to take advantages of the less severe punishments or difficulties of being traced.

A cyberattack occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content.

The National Cyber Security Hall of Fame, founded by Larry Letow and Rick Geritz, was established in 2012 to recognize the contributions of key individuals in the field of cyber security; its mission statement is, Respect the Past – Protect the Future. According to its website, it is designed to honor the innovative individuals and organizations which had the vision and leadership to create the fundamental building blocks for the cybersecurity Industry. The organization also highlights major milestones in the industry's 40-year history through a timelineArchived 2013-12-30 at the Wayback Machine representation, which includes inductees and their corresponding accomplishments.

Operation Tovar was an international collaborative operation carried out by law enforcement agencies from multiple countries against the Gameover ZeuS botnet, which was believed by the investigators to have been used in bank fraud and the distribution of the CryptoLocker ransomware.

The following outline is provided as an overview of and topical guide to computer security:

<span class="mw-page-title-main">Tarah Wheeler</span> American cybersecurity executive and diversity activist (born 1979)

Tarah Marie Wheeler is an American technology and cybersecurity author, public speaker, computer security professional, and executive. She is currently CEO of Red Queen Dynamics and Senior Fellow of Global Cyber Policy at the Council on Foreign Relations, and she is the author of Women in Tech.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face, the risks they introduce and mitigating security best practices to guide their behavior. End users are considered the weakest link and the primary vulnerability within a network. Since end-users are a major vulnerability, technical means to improve security are not enough. Organizations could also seek to reduce the risk of the human element. This could be accomplished by providing security best practice guidance for end users' awareness of cyber security. Employees could be taught about common threats and how to avoid or mitigate them.

Cybersecurity in popular culture examines the various ways in which the themes and concepts related to cybersecurity have been portrayed and explored in different forms of popular culture, such as music, movies, television shows, and literature. As the digital age continues to expand and the importance of protecting computer systems, networks, and digital information grows, the awareness and understanding of cybersecurity have increasingly become a part of mainstream culture. Popular culture often portraits the gloomy underworld of cybersecurity, where unconventional tactics are used to combat a diverse range of threats to individuals, businesses, and governments. The integration of dark and mysterious elements into cybersecurity stories helps create a sense of uncertainty, rule-breaking, and intriguing ambiguity. This captures the public's attention and highlights the high stakes involved in the ongoing struggle to protect our digital world. This article highlights the creative works and cultural phenomena that have brought cybersecurity issues to the forefront, reflecting society's evolving relationship with technology, privacy, and digital security.

Kyle Hanslovan is an American engineer and information technology security analyst who served as a US Air Force Cyber Technical Sergeant.

References

  1. ReadWrite interview at RSA
  2. ACM Ubiquity, Volume 2006 Issue July
  3. Committee on Homeland Security, House Of Representatives, 114th Congress, 2/25/15
  4. Library of Congress
  5. Research Gate
  6. Proceedings of CyCon 2014: 6th International Conference On Cyber Conflict
  7. Virus Bulletin, 2015
  8. Internet Archive
  9. Symantec
  10. Securing Our eCity
  11. Los Angeles Times
  12. HIMSS Conference 2015
  13. TEDx San Diego 2015
  14. ResearchGate
  15. Wall Street Journal
  16. Cybersecurity Barometer: Cybercrime’s impact on privacy and security
  17. Cybersecurity a big concern in Canada as cybercrime’s impact grows
  18. Jackware: When connected cars meet ransomware
  19. "A Cybersecurity Wakeup Call for the Real Estate Industry". 19 August 2020.
  20. 2019 CompTIA Tech Champion Awards
  21. CompTIA Tech Champion Award video
  22. CompTIA Tech Champion Senator Cory Booker
  23. CompTIA Tech Champion Representative Anna Eshoo