Cyber Work podcast: Cryptography careers and IoT vulnerabilities with Ted Shorter – Digitalmunition

Featured CyberWorkIoT.png

Published on April 1st, 2020 📆 | 5961 Views ⚑


Cyber Work podcast: Cryptography careers and IoT vulnerabilities with Ted Shorter


In this episode of Infosec’s Cyber Work podcast series, host Chris Sienko speaks with Ted Shorter. Ted is co-founder and CTO of Keyfactor, a computer security firm. He has worked in security for over 20 years, with a focus on cryptography, application security, authentication and authorization services, and software vulnerability analysis. His past experience includes a master’s degree in computer science from Johns Hopkins University, active CISSP certification and 10 years at the National Security Agency (NSA). 

As a computer scientist and team lead at NSA, Ted briefed high-level government officials, including presidential advisors and members of the Joint Chiefs of Staff. Ted also served as lead software developer on a contract with the Department of Defense to integrate biometric authentication with the DoD Common Access Card program. Ted lives in Akron, Ohio with his wife and two sons.

Ted and Chris talked about a recent Keyfactor report, the danger of so-called “predictable randomness,” the raw work of cryptography in keeping devices like these safe, the importance of building security into their devices during design and development and some career advice for those who might like a career in cryptography.

What are some of the signposts or foundational experiences of your career?

A big piece of Ted’s foundational experiences center around problem-solving, and it is one of those things you are sort of born with. In terms of his professional history, it really started to take off when he joined a consulting firm called Certified Security Solutions in 2003. It was a boutique consultancy that spent a lot of time talking to clients about security strategy. 

During this time, Ted worked a lot with digital certificates and public infrastructure. Certified Security Solutions focused on identifying unmet needs of customers regarding products and implementation. To this end, they (Read more…)

Source link

Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *