Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

6/26/2013
12:40 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Raytheon BBN Technologies Chief Scientist Stephen Kent Inducted Into Internet Hall Of Fame

Kent developed the world's first Transmission Control Protocol (TCP) end-to-end encryption system

CAMBRIDGE, Mass., June 26, 2013 /PRNewswire/ -- Raytheon BBN Technologies Chief Scientist Stephen Kent has been inducted into the Internet Hall of Fame for his groundbreaking contributions in cybersecurity. Over three decades, Kent's work has laid the foundation for modern Internet and email security encryption methods and standards. Raytheon BBN Technologies is a wholly owned subsidiary of Raytheon Company (NYSE: RTN).

Kent is the second member of the Raytheon BBN team to be honored by the Internet Hall of Fame in as many years. Ray Tomlinson, a principal engineer with Raytheon BBN Technologies who sent the first network email in 1971 and saved the "@"

symbol from probable extinction, was honored last year with the first inductees into the Hall of Fame.

Kent developed the world's first Transmission Control Protocol (TCP) end-to-end encryption system and is the author of the "core" Internet Protocol security suite (IPsec) standards, a key security component in major operating systems, firewall products and widely-deployed tunneling protocols. He helped lead the creation of the first email security standard, Privacy Enhanced Mail (PEM), and established the Internet's first Public Key Infrastructure (PKI), which introduced the concepts of certificate policies and certification practice statements.

"It is an honor to join the distinguished individuals, including my Raytheon BBN colleague Ray Tomlinson, in the Internet Hall of Fame," said Kent. "Security and privacy have never been more challenging or important than they are today.

Security experts must constantly design and implement leading-edge solutions to address an endless barrage of cyber threats."

This is the most recent of Kent's many prestigious honors. Among his other honors, he is a Fellow of the Association for Computing Machinery, where he served as a national lecturer; an Internet Society Pioneer Member; a Delta Epsilon Sigma Member; and a National Science Foundation Graduate Fellow in Computer Science.

About The Internet Society and Its Internet Hall of Fame

The Internet Society established the Internet Hall of Fame last year to mark its 20th anniversary and to acknowledge the Internet's profound impact on society.

An Advisory Board of computer scientists, software engineers, Internet developers, historians, executives, venture capitalists, authors, researchers, futurists, academics, analysts and journalists selected Internet Hall of Fame honorees from an open nomination process. The organization promotes open dialogue on Internet policy, technology and future development among users, companies, governments and other organizations.

About Raytheon

Raytheon Company, with 2012 sales of $24 billion and 68,000 employees worldwide, is a technology and innovation leader specializing in defense, security and civil markets throughout the world. With a history of innovation spanning 91 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems; as well as a broad range of mission support services. Raytheon is headquartered in Waltham, Mass.

For more about Raytheon, visit us at www.raytheon.com and follow us on Twitter @raytheon.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15001
PUBLISHED: 2020-07-09
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when u...
CVE-2020-15092
PUBLISHED: 2020-07-09
In TimelineJS before version 3.7.0, some user data renders as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most T...
CVE-2020-15093
PUBLISHED: 2020-07-09
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A ...
CVE-2020-15299
PUBLISHED: 2020-07-09
A reflected Cross-Site Scripting (XSS) Vulnerability in the KingComposer plugin through 2.9.4 for WordPress allows remote attackers to trick a victim into submitting an install_online_preset AJAX request containing base64-encoded JavaScript (in the kc-online-preset-data POST parameter) that is execu...
CVE-2020-4173
PUBLISHED: 2020-07-09
IBM Guardium Activity Insights 10.6 and 11.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure l...