CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

Frequently Asked Questions - General

Questions:

Q: Reflecting on the Internet Worm at 35
A:

Q: AI and ML Sturm und Drang
A:

Q: Reflections on the 2023 RSA Conference
A:

Q: Interview with Spaf at S4x23
A:

Q: Serious CERIAS Recognition
A:

Q: Malicious Compliance: A story
A:

Q: Three podcasts with Spaf
A:

Q: Spaf Interviewed About His New Book
A:

Q: 2022 ISSA Honorees
A:

Q: Get some CERIAS and Spaf Swag!
A:

Q: CERIAS is on the move!
A:

Q: The more things change….
A:

Q: Who Says You Can’t Predict the Future?
A:

Q: It’s been 30 years—time to celebrate!
A:

Q: Reflecting on 30 years
A:

Q: 50 Years, and Lessons (Not) Learned
A:

Q: Riffing on the Ph.D. Degree
A:

Q: So you have to learn a 3rd programming language?
A:

Q: Sturm und Drang and Hacking and Twitter
A:

Q: Summary of July 15th, 2020 Purdue Seminar on Control System Cyber Security
A:

Q: COAST, Machine names, Sun, and Microsoft
A:

Q: A Test of Time: COAST and an award-winning paper
A:

Q: Near the Root of Cybersecurity Dysfunction
A:

Q: Challenging Conventional Wisdom
A:

Q: Cyber Security Hall of Fame 2019 Inductees
A:

Q: March Sadness
A:

Q: A Common Theme
A:

Q: Things are not getting better
A:

Q: Cybersecurity Hall of Fame Nominations Open Again!
A:

Q: Spaf videos, blasts from the past, future thoughts
A:

Q: How far do warrants reach in “The Cloud”?
A:

Q: Another good one gone too soon
A:

Q: A Blast from the Past
A:

Q: Time passes, and we lose friends
A:

Q: Another Surprise for Spaf
A:

Q: It Was A Good Monday
A:

Q: Passing of a Cyber Securty Pioneer
A:

Q: Changes for CERIAS…and Spaf
A:

Q: Nominations solicitied for the CSHOF
A:

Q: Another year, another RSAC
A:

Q: A looming anniversary, and a special offer
A:

Q: Cyber Security in Stasis
A:

Q: Privacy, Surveillance, Freedom of Expression, and Purdue University
A:

Q: Why I Don’t Attend Cons
A:

Q: Déjà Vu All Over Again: The Attack on Encryption
A:

Q: Teaching Information Security
A:

Q: Short, Random Thought on Testing
A:

Q: Two Items of interest
A:

Q: Time Critical—Purdue Day of Giving
A:

Q: Initial Thoughts on the RSA 2015 Conference
A:

Q: CERIAS 2015 Symposium Now Online!
A:

Q: What is wrong with all of you? Reflections on nude pictures, victim shaming, and cyber security
A:

Q: Videos from the 15th Annual CERIAS Symposium
A:

Q: Update on “Patching is Not Security”
A:

Q: Why We Don’t Have Secure Systems Yet, Introduction
A:

Q: Patching is Not Security
A:

Q: In Memorium: Wyatt Starnes
A:

Q: A Special Opportunity to Support CERIAS
A:

Q: Thoughts on the RSA Conference, Boycotts, and Babes
A:

Q: Telling the Future, Looking at the Past: A Few Short Items
A:

Q: If you are bored or morbidly curious…
A:

Q: You’re invited!
A:

Q: Another Loss in the Community
A:

Q: We’re Out of Balance
A:

Q: The Passing of A Pioneer
A:

Q: Thoughts—Some Random, Some Structured
A:

Q: Happy Anniversary—Bang My Head Against A Wall
A:

Q: Just sayin
A:

Q: Opticks and a Treatise on the PRISM Surveillance Program (Guest Blog)
A:

Q: Schrodinger’s Catnip: A Review of the NSA Phone Surveillance Program (Guest Blog)
A:

Q: Opening Keynote: Todd Gebhart, Co-President McAfee Inc. (Summary)
A:

Q: Keynote: Christopher Painter, Coordinator for Cyber Issues, U.S. Department of State (Summary)
A:

Q: Tech Talk #3: Stephen Elliott (Summary)
A:

Q: Featured Commentary: The Honorable Mark Weatherford, DHS Deputy Under Secretary for Cybersecurity
A:

Q: Panel 3: Security Education and Training (Panel Summary)
A:

Q: Panel 2: NSTIC, Trusted Identities and the Internet (Panel Summary)
A:

Q: Panel 1: Security Analytics, Analysis, and Measurement (Panel Summary)
A:

Q: On Competitions and Competence
A:

Q: Login with Facebook, Google and LinkedIn
A:

Q: Looking for fail2ban++
A:

Q: Keynote: Howard Schmidt (Keynote Summary)
A:

Q: Security Fireside Chat (Summary)
A:

Q: Panel #3: Securing Mobile Devices (Panel Summary)
A:

Q: Panel #2: Big Data Analytics (Panel Summary)
A:

Q: Panel #1: Securing SCADA Systems (Panel Summary)
A:

Q: Opening Keynote: Arthur W. Coviello, Jr. (Keynote Summary)
A:

Q: An Interesting Opportunity
A:

Q: Gene Schultz, R. I. P.
A:

Q: More than passive defense
A:

Q: Bullies, Pirates and Lulz
A:

Q: U.S. Memorial Day Thoughts on Cyber War
A:

Q: Sony, Congress, The Media and Me
A:

Q: Panel #4: Securing Web 2.0 (Panel Summary)
A:

Q: Panel #3: Fighting Through: Mission Continuity Under Attack (Panel Summary)
A:

Q: Panel #2: Scientific Foundations of Cyber Security (Panel Summary)
A:

Q: Panel #1: Traitor Tracing and Data Provenance (Panel Summary)
A:

Q: Opening Keynote: Neal Ziring (Symposium Summary)
A:

Q: A Recent Interview, and other info
A:

Q: Can Your IPv4 Firewall Be Bypassed by IPv6 Traffic?
A:

Q: “Game Change” Request for comments
A:

Get Your Degree with CERIAS