CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

Frequently Asked Questions - General

Questions:

Q: Another good one gone too soon
A:

Q: A Blast from the Past
A:

Q: Time passes, and we lose friends
A:

Q: Another Surprise for Spaf
A:

Q: It Was A Good Monday
A:

Q: Passing of a Cyber Securty Pioneer
A:

Q: Changes for CERIAS…and Spaf
A:

Q: Nominations solicitied for the CSHOF
A:

Q: Another year, another RSAC
A:

Q: A looming anniversary, and a special offer
A:

Q: Cyber Security in Stasis
A:

Q: Privacy, Surveillance, Freedom of Expression, and Purdue University
A:

Q: Why I Don’t Attend Cons
A:

Q: Déjà Vu All Over Again: The Attack on Encryption
A:

Q: Teaching Information Security
A:

Q: Short, Random Thought on Testing
A:

Q: Two Items of interest
A:

Q: Time Critical—Purdue Day of Giving
A:

Q: Initial Thoughts on the RSA 2015 Conference
A:

Q: CERIAS 2015 Symposium Now Online!
A:

Q: What is wrong with all of you? Reflections on nude pictures, victim shaming, and cyber security
A:

Q: Videos from the 15th Annual CERIAS Symposium
A:

Q: Update on “Patching is Not Security”
A:

Q: Why We Don’t Have Secure Systems Yet, Introduction
A:

Q: Patching is Not Security
A:

Q: In Memorium: Wyatt Starnes
A:

Q: A Special Opportunity to Support CERIAS
A:

Q: Thoughts on the RSA Conference, Boycotts, and Babes
A:

Q: Telling the Future, Looking at the Past: A Few Short Items
A:

Q: If you are bored or morbidly curious…
A:

Q: You’re invited!
A:

Q: Another Loss in the Community
A:

Q: We’re Out of Balance
A:

Q: The Passing of A Pioneer
A:

Q: Thoughts—Some Random, Some Structured
A:

Q: Happy Anniversary—Bang My Head Against A Wall
A:

Q: Just sayin
A:

Q: Opticks and a Treatise on the PRISM Surveillance Program (Guest Blog)
A:

Q: Schrodinger’s Catnip: A Review of the NSA Phone Surveillance Program (Guest Blog)
A:

Q: Opening Keynote: Todd Gebhart, Co-President McAfee Inc. (Summary)
A:

Q: Keynote: Christopher Painter, Coordinator for Cyber Issues, U.S. Department of State (Summary)
A:

Q: Tech Talk #3: Stephen Elliott (Summary)
A:

Q: Featured Commentary: The Honorable Mark Weatherford, DHS Deputy Under Secretary for Cybersecurity
A:

Q: Panel 3: Security Education and Training (Panel Summary)
A:

Q: Panel 2: NSTIC, Trusted Identities and the Internet (Panel Summary)
A:

Q: Panel 1: Security Analytics, Analysis, and Measurement (Panel Summary)
A:

Q: On Competitions and Competence
A:

Q: Login with Facebook, Google and LinkedIn
A:

Q: Looking for fail2ban++
A:

Q: Keynote: Howard Schmidt (Keynote Summary)
A:

Q: Security Fireside Chat (Summary)
A:

Q: Panel #3: Securing Mobile Devices (Panel Summary)
A:

Q: Panel #2: Big Data Analytics (Panel Summary)
A:

Q: Panel #1: Securing SCADA Systems (Panel Summary)
A:

Q: Opening Keynote: Arthur W. Coviello, Jr. (Keynote Summary)
A:

Q: An Interesting Opportunity
A:

Q: Gene Schultz, R. I. P.
A:

Q: More than passive defense
A:

Q: Bullies, Pirates and Lulz
A:

Q: U.S. Memorial Day Thoughts on Cyber War
A:

Q: Sony, Congress, The Media and Me
A:

Q: Panel #4: Securing Web 2.0 (Panel Summary)
A:

Q: Panel #3: Fighting Through: Mission Continuity Under Attack (Panel Summary)
A:

Q: Panel #2: Scientific Foundations of Cyber Security (Panel Summary)
A:

Q: Panel #1: Traitor Tracing and Data Provenance (Panel Summary)
A:

Q: Opening Keynote: Neal Ziring (Symposium Summary)
A:

Q: A Recent Interview, and other info
A:

Q: Can Your IPv4 Firewall Be Bypassed by IPv6 Traffic?
A:

Q: “Game Change” Request for comments
A:

Q: Panel #3: The Evolution of Research Funding and Projects (Symposium Summary)
A:

Q: CERIAS Seminar Presentation: David Bell (Symposium Summary)
A:

Q: Morning Keynote Address: DHS Undersecretary Rand Beers (Symposium Summary)
A:

Q: Fireside Chat (Symposium Summary)
A:

Q: Panel #2: Infosec Ethics (Symposium Summary)
A:

Q: Panel #1: Visualization of Security (Symposium Summary)
A:

Q: Opening Keynote: Mike McConnell (Symposium Summary)
A:

Q: Making the CWE Top 25, 2010 Edition
A:

Q: Cowed Through DNS
A:

Q: Blast from the Past
A:

Q: Drone “Flaw” Known Since 1990s Was a Vulnerability
A:

Q: Talking to the Police All the Time
A:

Q: “Verified by VISA”: Still Using SSNs Online, Dropped by PEFCU
A:

Q: Firefox Vulnerabilities: Souvenirs of Windows 95
A:

Q: Are We All Aware Yet?
A:

Q: Cassandra Firing GnuPG Blanks
A:

Q: What About the Other 11 Months?
A:

Q: The Secunia Personal Software Inspector
A:

Q: Odds & Ends
A:

Q: ReAssure 1.20 Release
A:

Q: Still no sign of land
A:

Q: A Quick Note about Cloud Computing
A:

Q: Beware SQL libraries missing prepared statement support
A:

Q: Other cybersecurity legislation in the U.S.
A:

Q: Cybersecurity Legislation
A:

Q: The ACM Banquet
A:

Q: A Cynic’s Take on Cyber Czars and 60-day Reports
A:

Q: Solving the Wrong Problems
A:

Q: Symposium Transcript: Complexity vs. Security—Choosing the Right Curve, Morning Keynote Address
A:

Q: Symposium Summary: Complexity vs. Security—Choosing the Right Curve, Morning Keynote Address
A:

Q: Symposium Summary: Unsecured Economies Panel
A:

Get Your Degree with CERIAS