Jump to content

User:Eliza746/sandbox

From Wikipedia, the free encyclopedia

Steve Grobman is a cybersecurity expert, author, computer scientist, and technology developer, and is currently the chief technology officer for Intel Security. He is frequently interviewed by media outlets on the topics of ransomware, automotive security, critical infrastructure, cyber warfare, cybercrime, encryption, and other cybersecurity issues, and has testified before Congress about protecting small businesses from cyberattacks[1]. Grobman also serves on the board of the FIDO Alliance (Fast IDentity Online) Alliance[2]and is president of the Automotive Security Review Board[3], a non-profit research group focused on addressing cybersecurity risks in connected and self-driving vehicles.

Career[edit]

Grobman started his career at IBM where he spent four years as a solutions programmer and developer. In 1994, he moved to Intel, where served as chief security technologist for the Intel Atom processor system-on-chip design group and spent seven years as chief architect for Intel vPro technology platforms. In 2012, he joined Intel Security and was appointed as chief technology officer in 2014[4]. Over the course of his career, he has been granted 20 patents related to cybersecurity, servers, and processors.

U.S. Patents[edit]

Grobman holds the following patents:[5]

  • 9,426,147-Protected device management
  • 9,177,129-Devices, systems, and methods for monitoring and asserting trust
  • 9,135,450-Systems and methods for protecting symmetric encryption keys
  • 8,996,883-Securing inputs from malware
  • 8,984,613-Server pool Kerberos authentication scheme
  • 8,615,757-Negotiated virtual machine in a multi-virtual machine environment
  • 8,612,753-Method and apparatus for protected code execution on clients
  • 8,452,954-Methods and systems to bind a device to a computer system
  • 8,239,933-Network protecting authentication proxy
  • 8,191,062-Deriving CPU utilization based on the state of virtual machine monitor
  • 7,971,057-Exclusive access for secure audio program
  • 7,904,903-Selective register save and restore upon context switch using trap
  • 7,845,009-Method and apparatus to detect kernel mode rootkit events
  • 7,788,713-Method, apparatus and system for virtualized peer-to-peer proxy services
  • 7,752,436-Exclusive access for secure audio program
  • 7,739,532-Method, apparatus and system for enhanced CPU frequency governers
  • 7,669,229-Network protecting authentication proxy
  • 7,539,986-Method for guest operating system integrity validation
  • 7,334,145-Predictive processor speed governor
  • 7,215,778-Encrypted content recovery


Research and Publications[edit]

  • The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War (November 2016)[6]
  • Opinion: Cyber Conflict in the Oval Office (September 2016)[7]
  • Internet of Things: 50 Billion Connected Targets (May 2016)[8]
  • The Machines Are Coming! (March 2016)[9]
  • Is Cybercrime Just a Cost of Doing Business (January 2016)[10]
  • Raising the Stakes: When Software Attacks Hardware (March 2015)[11]
  • Planning for the Future Cyber Security Environment, Proceedings from the 29th International Workshop on Global Security (July 2012)
  • Teach Yourself Delphi in 14 days (April 1997)[12]
  • Teach Yourself Delphi in 21 days (February 1996)[13]


Security Expertise[edit]

Grobman has been interviewed by numerous media outlets on various cybersecurity topics.

Automotive and Aviation Security[edit]

  • US Issues Federal Security Guidance on Self-Driving Cars[14]
  • Understanding and Preventing Car Hack Attacks[15]
  • A Hacker Claims He Took Over a Plane[16]

Cloud Security[edit]

  • On-Premise Alive and Kicking[17]

Critical Infrastructure[edit]

  • U.S. Charges Seven Iranians in Cyberattacks[18]
  • Preparing for the Next Big Cyberattack[19]

Cybercrime[edit]

  • Intel: Criminals Getting Better at Data Exfiltration[20]

Cyber warfare[edit]

  • Is Russia Behind the Dumping of NSA Hacking Tools on the Web[21]
  • Experts: Hard to Prove Russian Behind DNC Attack[22]
  • How Investigators Decide that a Country Is Behind a Cyberattack[23]
  • How to Guard Against Cyber Threats[24]

Device and Home Security[edit]

  • Would You Let Companies Monitor Your for Money?[25]
  • 9 ways to Make Your Smart Home More Secure[26]
  • The Rise of IoT Hacking: New Dangers, New Solutions[27]
  • Intel Security CTO: Partners Have A Big Part To Play In Protecting Connected Devices[28]

Encryption[edit]

  • Intel Security Guru Says Regulating Encryption is Difficult[29]
  • Quantum Leap? The Impact of Quantum Computing on Encryption[30]

Presidential Election[edit]

  • How Russian Hackers Could Disrupt the U.S. Election[31]
  • Hacking of DNC Raises Fears of Cyber Attack on US Election[32]

Ransomware[edit]

  • Ransomware Warning[33]
  • Ransomware Threat Growing, Aimed at More Soft Targets[34]
  • Security Experts Warn Ransomware Attacks Will Grow in 2016[35]
  • What to Do If Your Computer Is Taken Over by Ransomware[36]
  • Holding Your Devices Hostage[37]
  • Ransomware Could Lock Your Brakes[38]

Small Business Security[edit]

  • Congressional Testimony: Small Business, Big Threat: Protecting Small Businesses From Cyber Attacks - United States House Of Representatives Committee On Small Business Full Committee Hearing[39]
  • Three Best Practices for SMBs Embracing the Cloud[40]


Industry Panels[edit]

  • Aspen Security Forum, 2016: Cyber’s Role in America’s Security Arsenal[41]
  • Structure Data 2016 Conference: Can We Really Secure Our Data, and Do We Need To?[42]
  1. ^ http://smallbusiness.house.gov/uploadedfiles/4-22-2015_steve_grobman_testimony.pdf. {{cite web}}: Missing or empty |title= (help)
  2. ^ https://fidoalliance.org/about/board/. {{cite web}}: Missing or empty |title= (help)
  3. ^ https://asrb.org/member/steve-grobman/. {{cite web}}: Missing or empty |title= (help)
  4. ^ http://www.mcafee.com/us/about/management/steve-grobman.aspx. {{cite web}}: Missing or empty |title= (help)
  5. ^ http://www.uspto.gov. {{cite web}}: Missing or empty |title= (help)
  6. ^ https://www.amazon.com/Second-Economy-Trust-Treasure-Cybersecurity/dp/1484222288/ref=sr_1_1?s=books&ie=UTF8&qid=1476804416&sr=1-1. {{cite web}}: Missing or empty |title= (help)
  7. ^ http://www.cbsnews.com/news/cyber-conflict-in-the-oval-office/. {{cite news}}: Missing or empty |title= (help)
  8. ^ http://www.darkreading.com/partner-perspectives/intel/internet-of-things-50-billion-connected-targets/a/d-id/1325539. {{cite web}}: Missing or empty |title= (help)
  9. ^ http://www.darkreading.com/partner-perspectives/intel/the-machines-are-coming!-the-machines-are-coming. {{cite web}}: Missing or empty |title= (help)
  10. ^ http://www.securitymagazine.com/articles/86899-is-cybercrime-just-a-cost-of-doing-business?sf19745963=1. {{cite web}}: Missing or empty |title= (help)
  11. ^ http://www.darkreading.com/partner-perspectives/intel/raising-the-stakes-when-software-attacks-hardware/a/d-id/1319423. {{cite web}}: Missing or empty |title= (help)
  12. ^ https://www.amazon.com/Teach-Yourself-Delphi-Days-Sams/dp/0672311143/ref=sr_1_2?s=books&ie=UTF8&qid=1476804416&sr=1-2. {{cite web}}: Missing or empty |title= (help)
  13. ^ https://www.amazon.com/Teach-Yourself-Delphi-Days-Sams/dp/0672308630. {{cite web}}: Missing or empty |title= (help)
  14. ^ http://www.infosecurity-magazine.com/news/us-issues-federal-security/. {{cite news}}: Missing or empty |title= (help)
  15. ^ http://video.foxbusiness.com/v/4495466359001/understanding-and-preventing-car-hack-attacks/?#sp=show-clips. {{cite news}}: Missing or empty |title= (help)
  16. ^ http://video.foxbusiness.com/v/4243387958001/a-hacker-claims-he-took-over-a-plane/?#sp=show-clips. {{cite news}}: Missing or empty |title= (help)
  17. ^ http://www.channelnomics.com/channelnomics-us/news/2432681/on-premise-alive-and-kicking-intel-fellow-tells-conference. {{cite news}}: Missing or empty |title= (help)
  18. ^ http://www.usatoday.com/story/news/world/2016/03/24/iran-lynch-comey-hacking/82203888/. {{cite news}}: Missing or empty |title= (help)
  19. ^ http://federalnewsradio.com/federal-drive/2015/08/steve-grobman-preparing-for-the-next-big-cyber-attack/. {{cite news}}: Missing or empty |title= (help)
  20. ^ http://www.csoonline.com/article/2978164/advanced-persistent-threats/intel-criminals-getting-better-at-data-exfiltration.html. {{cite news}}: Missing or empty |title= (help)
  21. ^ https://www.thecipherbrief.com/article/exclusive/tech/russia-behind-dumping-nsa-hacking-tools-web-1092. {{cite news}}: Missing or empty |title= (help)
  22. ^ http://www.usatoday.com/story/tech/news/2016/07/25/experts-hard-prove-russians-behind-dnc-hack/87529230/. {{cite news}}: Missing or empty |title= (help)
  23. ^ http://www.cnbc.com/2016/09/19/how-investigators-decide-that-a-country-is-behind-a-cyberattack.html. {{cite news}}: Missing or empty |title= (help)
  24. ^ http://www.bloomberg.com/news/videos/2015-11-17/how-to-guard-against-cyber-threats. {{cite news}}: Missing or empty |title= (help)
  25. ^ . The Atlantic http://www.theatlantic.com/technology/archive/2016/04/would-you-let-companies-monitor-you-for-money/476298/. {{cite news}}: Missing or empty |title= (help)
  26. ^ . PC Mag http://www.pcmag.com/news/343329/9-ways-to-make-your-smart-home-more-secure. {{cite news}}: Missing or empty |title= (help)
  27. ^ http://www.zdnet.com/article/the-rise-of-iot-hacking-new-dangers-new-solutions/. {{cite news}}: Missing or empty |title= (help)
  28. ^ http://www.crn.com/slide-shows/components-peripherals/300077831/intel-security-cto-partners-have-a-big-part-to-play-in-protecting-connected-devices.htm. {{cite news}}: Missing or empty |title= (help)
  29. ^ . Fortune http://fortune.com/2016/03/10/intel-security-regulating-encryption/. {{cite news}}: Missing or empty |title= (help)
  30. ^ http://www.scmagazine.com/quantum-leap-the-impact-of-quantum-computing-on-encryption/article/459932/. {{cite news}}: Missing or empty |title= (help)
  31. ^ . CBS News http://www.cbsnews.com/news/how-russian-hackers-could-disrupt-the-u-s-election/. {{cite news}}: Missing or empty |title= (help)
  32. ^ http://m.phys.org/news/2016-08-hacking-dnc-cyber-election.html. {{cite news}}: Missing or empty |title= (help)
  33. ^ . CNBC http://video.cnbc.com/gallery/?video=3000504917. {{cite news}}: Missing or empty |title= (help)
  34. ^ . Japan Times http://www.japantimes.co.jp/news/2016/03/23/world/crime-legal-world/ransomware-threat-growing-targeting-soft-targets#.WAffI_krJpg. {{cite news}}: Missing or empty |title= (help)
  35. ^ http://abcnews.go.com/GMA/video/security-experts-warn-ransomware-attacks-grow-2016-35506236?sf16276266=1. {{cite news}}: Missing or empty |title= (help)
  36. ^ http://www.businessinsider.com/heres-what-to-do-if-your-computer-gets-taken-over-by-ransomware-2015-6?sf9892519=1. {{cite news}}: Missing or empty |title= (help)
  37. ^ https://www.thecipherbrief.com/article/tech/holding-your-devices-hostage-1092. {{cite news}}: Missing or empty |title= (help)
  38. ^ http://www.investors.com/news/technology/black-hat-2016-ransomware-could-lock-your-brakes-at-60-mph/. {{cite news}}: Missing or empty |title= (help)
  39. ^ http://smallbusiness.house.gov/uploadedfiles/4-22-2015_steve_grobman_testimony.pdf. {{cite web}}: Missing or empty |title= (help)
  40. ^ http://www.techrepublic.com/article/3-best-practices-for-smbs-embracing-the-cloud/. {{cite news}}: Missing or empty |title= (help)
  41. ^ https://www.youtube.com/watch?v=RthaWZyT0_Q&feature=youtu.be. {{cite web}}: Missing or empty |title= (help)
  42. ^ http://livestream.com/structure/structuredata2016/videos/115106400. {{cite web}}: Missing or empty |title= (help)