Human Security Launches Dan Kaminsky FellowshipHuman Security Launches Dan Kaminsky Fellowship
The fellowship, created in honor of Human's co-founder and chief scientist Dan Kaminsky, will be awarded to someone "who epitomizes benevolent internet innovation."
August 3, 2021

Human Security has established the Dan Kaminsky Fellowship in honor of its late co-founder and chief scientist.
Security industry leader and innovator Dan Kaminsky passed away unexpectedly earlier this year. He worked on nearly every aspect of security, including network security, cryptography, Web security, and ad-fraud prevention with the co-founding of Human (formerly White Ops). His most well-known research was the discovery of a massive DNS vulnerability in 2008, after which Kaminsky helped drive a collaborative patching effort and later presented his findings.
The Dan Kaminsky Fellowship will be awarded to the human (or humans) "who epitomizes benevolent internet innovation," Human writes in a release. In honor of its namesake, the Fellow's open source project "will touch on a problem that, if solved, will improve people's lives on the internet."
Human is offering Fellows a year of full-time employment to dedicate to working on their project. In addition to the same employment benefits as Human's full-time employees, they will be given an adviser to report to who will help them navigate resources within the company.
The fellowship will culminate with a presentation during at least one of the major security conferences, such as Black Hat, DEF CON, and RSA Conference, said Tamer Hassan, co-founder and CEO of Human Security.
"Dan wasn't just a great builder; he was also a great presenter," Hassan said in a statement. "Sharing and presenting, and preparing our Fellows to do so at their best, will be a major piece of this Fellowship."
Applications for the Dan Kaminsky Fellowship opened on Aug. 2, 2021, and will close on Oct. 1, 2021.
Read more about the fellowship and application process here.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023