Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

6/26/2013
12:40 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Raytheon BBN Technologies Chief Scientist Stephen Kent Inducted Into Internet Hall Of Fame

Kent developed the world's first Transmission Control Protocol (TCP) end-to-end encryption system

CAMBRIDGE, Mass., June 26, 2013 /PRNewswire/ -- Raytheon BBN Technologies Chief Scientist Stephen Kent has been inducted into the Internet Hall of Fame for his groundbreaking contributions in cybersecurity. Over three decades, Kent's work has laid the foundation for modern Internet and email security encryption methods and standards. Raytheon BBN Technologies is a wholly owned subsidiary of Raytheon Company (NYSE: RTN).

Kent is the second member of the Raytheon BBN team to be honored by the Internet Hall of Fame in as many years. Ray Tomlinson, a principal engineer with Raytheon BBN Technologies who sent the first network email in 1971 and saved the "@"

symbol from probable extinction, was honored last year with the first inductees into the Hall of Fame.

Kent developed the world's first Transmission Control Protocol (TCP) end-to-end encryption system and is the author of the "core" Internet Protocol security suite (IPsec) standards, a key security component in major operating systems, firewall products and widely-deployed tunneling protocols. He helped lead the creation of the first email security standard, Privacy Enhanced Mail (PEM), and established the Internet's first Public Key Infrastructure (PKI), which introduced the concepts of certificate policies and certification practice statements.

"It is an honor to join the distinguished individuals, including my Raytheon BBN colleague Ray Tomlinson, in the Internet Hall of Fame," said Kent. "Security and privacy have never been more challenging or important than they are today.

Security experts must constantly design and implement leading-edge solutions to address an endless barrage of cyber threats."

This is the most recent of Kent's many prestigious honors. Among his other honors, he is a Fellow of the Association for Computing Machinery, where he served as a national lecturer; an Internet Society Pioneer Member; a Delta Epsilon Sigma Member; and a National Science Foundation Graduate Fellow in Computer Science.

About The Internet Society and Its Internet Hall of Fame

The Internet Society established the Internet Hall of Fame last year to mark its 20th anniversary and to acknowledge the Internet's profound impact on society.

An Advisory Board of computer scientists, software engineers, Internet developers, historians, executives, venture capitalists, authors, researchers, futurists, academics, analysts and journalists selected Internet Hall of Fame honorees from an open nomination process. The organization promotes open dialogue on Internet policy, technology and future development among users, companies, governments and other organizations.

About Raytheon

Raytheon Company, with 2012 sales of $24 billion and 68,000 employees worldwide, is a technology and innovation leader specializing in defense, security and civil markets throughout the world. With a history of innovation spanning 91 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems; as well as a broad range of mission support services. Raytheon is headquartered in Waltham, Mass.

For more about Raytheon, visit us at www.raytheon.com and follow us on Twitter @raytheon.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16863
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
CVE-2019-18949
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
CVE-2011-1930
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
CVE-2011-1145
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
CVE-2011-1488
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...