翻訳と辞書
Words near each other
・ Herbert Kegel
・ Herbert Keigwin
・ Herbert Keller
・ Herbert Kelly
・ Herbert Kelly (disambiguation)
・ Herbert Kelman
・ Herbert Kemmer
・ Herbert Kennedy
・ Herbert Kennedy Andrews
・ Herbert Kenneth Airy Shaw
・ Herbert Kenwith
・ Herbert Keppler
・ Herbert Kerrigan
・ Herbert Kershaw
・ Herbert Kessler
Herbert Hugh Thompson
・ Herbert Hughes
・ Herbert Hughes (composer)
・ Herbert Hughes-Stanton
・ Herbert Hugo Menges
・ Herbert Huncke
・ Herbert Hunger
・ Herbert Hunt
・ Herbert Hunter
・ Herbert Huntingdon
・ Herbert Huntingdon Smith
・ Herbert Huntington
・ Herbert Hupka
・ Herbert Huppert
・ Herbert Huppertz


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Herbert Hugh Thompson : ウィキペディア英語版
Herbert Hugh Thompson

Dr. Herbert Hugh Thompson is a computer security expert and an Adjunct Professor in the Computer Science Department at Columbia University.〔(Columbia University course page for COMS E6998-9 Software Security and Exploitation )〕 He is also the Program Chairman of RSA Conference〔(RSA Conference Appoints Dr. Herbert H. Thompson as Program Committee Chair and Advisory Board Member )〕 the world’s largest information security conference with over 25,000 attendees annually. Thompson is the co-author of a book on human achievement titled The Plateau Effect: Getting from Stuck to Success published by Penguin in 2013 and has co-authored three books on information security including, How to Break Software Security: Effective Techniques for Security Testing published by Addison-Wesley, and The Software Vulnerability Guide published by Charles River 2005. He is perhaps best known for his role in exposing electronic voting machine vulnerabilities as part of the HBO Documentary Hacking Democracy. He was named one of the “Top 5 Most Influential Thinkers in IT Security" by SC Magazine and has been referred to by the Financial Times as “One of the world’s foremost cryptology and internet security experts.”
==Career==

Thompson began his career as an research intern for Microsoft Corporation while working on his Ph.D. in Applied Mathematics at the Florida Institute of Technology. He then went on to co-found Security Innovation Inc., an application security company and worked as their Chief Security Strategist. In 2007 he started another technology security company called People Security and also began teaching a course on “Software Security and Exploitation” at Columbia University that focused on methods to circumvent security mechanisms in software.〔(Columbia University: COMS E6998-9: Software Security and Exploitation )〕 He has written several books and over 100 peer reviewed papers on Computer Security and Hacking.〔Thompson, Herbert H. "Why security testing is hard." IEEE Security & Privacy 1.4 (2003): 83-86.〕〔Whittaker, James A., and Herbert H. Thompson. "Black Box Debugging." Queue 1.9 (2003): 68.〕〔Thompson, Herbert H., and James A. Whittaker. "Rethinking software security." DOCTOR DOBBS JOURNAL 29.2 (2004): 73-75.〕 Thompson has delivered keynotes at every RSA Conference since 2007.〔Thompson, Hugh. Keynote: “The Hugh Thompson Show with Guests Steve Wozniak and Craig Newmark” RSA Conference, http://www.youtube.com/watch?v=X3_grIAuV00〕 He has been interviewed by top news organizations including BBC News,〔BBC News, “How Safe is the Internet of Things?” http://www.bbc.com/news/business-28414165〕 Bloomberg Television,〔Bloomberg Television, First Up with Susan Li, “Cyber Security Threat Dynamic, Dangerous”. http://www.bloomberg.com/video/cyber-security-threat-dynamic-dangerous-thompson-VBG2kLSxRb6aBvXmoqUvvQ.html〕 CNN,〔(CNN transcripts ) 〕 Fox News,〔Fox News Television, “Increase in One Day Wonder Websites Help Disguise Malware” http://www.foxnews.com/tech/2014/08/28/increase-in-one-day-wonder-websites-help-disguise-malware/〕 The New York Times〔N. Perroth, “Security Needs Evolve as Computing Leaves the Office,” New York Times, 11 June 2014. http://bits.blogs.nytimes.com/2014/06/11/security-needs-evolve-as-computing-leaves-the-office/〕 and the Associated Press.〔R. Satter, “RESEARCHERS STYMIED BY HACKERS WHO DROP FAKE CLUES”, AP, 10 December 2014. http://hosted.ap.org/dynamic/stories/E/EU_HACKER_WHODUNIT〕 He is also a contributor to the New York Times,〔Sullivan, Bob, and Hugh Thompson. “Brain, Interrupted,” New York Times, May 5, 2013, pg. SR12.〕 Scientific American〔Thompson, H. "How I Stole Someone’s Identity." Scientific American, online feature posted August 18 (2008).〕 and IEEE Security & Privacy magazine.〔Hugh Thompson, "The Human Element of Information Security”, IEEE Security & Privacy, vol.11, no. 1, pp. 32-35, Jan.-Feb. 2013, doi:10.1109/MSP.2012.161〕
Thompson is currently Senior Vice President at security infrastructure company Blue Coat Systems.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Herbert Hugh Thompson」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.