Careers & People

10:30 AM
Dark Reading
Dark Reading
Products and Releases

BlackRidge Technology Advisor Whitfield Diffie Elected to Join The Royal Society

Reno, NV Thursday, July 20, 2017 – BlackRidge Technology International, Inc. (OTCQB: BRTI), a leader in cyber defense, is pleased to congratulate Dr. Whitfield Diffie, BlackRidge Advisor known for discovering the concept of public key cryptography, which underlies the security of internet commerce and all modern secure communication systems, for his election into The Royal Society.

Diffie has been a member of the BlackRidge Technical Advisory Board since 2012, actively advising the company on the practical use of cryptography in representing large identity populations, and on the important problem of establishing trust and accountability in corporate networks and cloud environments. He was also recently elected to the National Academy of Engineering, and Diffie previously received the 2015 ACM A.M. Turing Award for Critical Contributions to Modern Cryptography. 

The Royal Society is a Fellowship of many of the world's most eminent scientists and is the oldest scientific academy in continuous existence. The Society’s fundamental purpose, reflected in its founding Charters of the 1660s, is to recognize, promote, and support excellence in science and to encourage the development and use of science for the benefit of humanity.

 “I am honored to be elected to The Royal Society with such a distinguished group of scientists,” said Dr. Whitfield Diffie. “My passion in applying the principles of cryptography to securing internet computing remains as strong through my active role with BlackRidge Technology.  Blackridge Transport Access Control rejects unwanted TCP connections quickly and cheaply, This providing a new level of cyber defense. This not only avoids wasting computer cycles on trying to detect intruders, it prevents them from acquiring information to launch attacks in the first place.''

Dr Whitfield Diffie is best known for discovering the concept of public key cryptography, which underlies the security of internet commerce and all modern secure communication systems. He is a Consulting Scholar in the Center for International Security and Cooperation at Stanford and a Visiting Professor at Royal Holloway College of the University of London. After leaving Stanford University in the late 1970s, he became Manager of Secure Systems Research for Bell-Northern Research, the laboratory of the Canadian telephone system.  In 1991, he moved to Sun Microsystems, rising to be Vice-President, Sun Fellow, and Chief Security Officer until 2009.  Since leaving Sun, he has worked primarily as an advisor to innovative startups in the security field.  Diffie received the 2015 Turing Award and in 2017 was elected to the National Academy of Engineering.

Since 1993, much of Diffie's attention has been focused on public policy, in the areas of cryptography, security, and privacy. His position --- in opposition to limitations on the business and personal use of cryptography --- has been the subject of articles in the New York Times Magazine, Wired, and Discover and programs on CNN, the Discovery Channel, and Equinox TV.

“Diffie's contributions as one of the world's foremost cryptographers continue to be invaluable to BlackRidge's vision of establishing trust across networks and cloud services,” said John Hayes, Chief Technology Officer of BlackRidge Technology. “We really enjoy working with Whit and appreciate his active contributions to our identity-based approach to cyber defense.”

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
IoT Product Safety: If It Appears Too Good to Be True, It Probably Is
Pat Osborne, Principal - Executive Consultant at Outhaul Consulting, LLC, & Cybersecurity Advisor for the Security Innovation Center,  3/12/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.