<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>index on Sean Peisert, Ph.D.</title>
    <link>https://peisert.net/</link>
    <description>Recent content in index on Sean Peisert, Ph.D.</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <managingEditor>spp@peisert.net (Sean Peisert, Ph.D.)</managingEditor>
    <webMaster>spp@peisert.net (Sean Peisert, Ph.D.)</webMaster>
    <lastBuildDate>Mon, 05 Jan 2026 17:39:42 +0000</lastBuildDate>
    <atom:link href="https://peisert.net/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>An Oral History Interview with Sean Peisert</title>
      <link>https://peisert.net/blog/2026/01/06/an-oral-history-interview-with-sean-peisert/</link>
      <pubDate>Mon, 05 Jan 2026 17:39:42 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2026/01/06/an-oral-history-interview-with-sean-peisert/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;This oral history interview with Dr. Sean Peisert begins by briefly exploring Dr. Peisert’s evolving early interests prior to and his first years of college at UCSD, and how he came to focus on computer science, and within computer science earned a Ph.D. at the same institution. As part of this he discusses key mentors and opportunities he had to work with standout computer scientists and computer security specialists early on, and continuing as a peer, to date in his career. This included work at the UCSD Supercomputer Center. He relates his decision to join Berkeley Lab as a Research Scientist at Lawrence Berkeley National Laboratory, and to become an Adjunct Professor in the Computer Science Department at the University of California, Davis. The bulk of the interview focuses on his research in various areas of computer security and privacy such as electronic voting, digital forensics, cybersecurity for energy delivery, intrusion detection systems, privacy and protocols for handling medical data. He discusses history of science, and his repeated penchant for finding ways to combine areas that previously had not been combined to help solve real world problems for government and for society. He also comments on teaching, his leadership with technical committees, the history of the Oakland Conference (IEEE Symposium on Security and Privacy) and his service as General Chair, as well as his work in publishing that included strategic directions he took IEEE Security &amp;amp; Privacy, toward greater currency, and a board with greater gender and geographic diversity.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Safely Steering Scientific Progress on the High Seas</title>
      <link>https://peisert.net/blog/2025/10/02/safely-steering-scientific-progress-on-the-high-seas/</link>
      <pubDate>Wed, 01 Oct 2025 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2025/10/02/safely-steering-scientific-progress-on-the-high-seas/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Modern cars are like computers on wheels. From the dashboard displays to the steering wheel and even your car keys, a complex dance of computer parts and mechanical components work together to keep you safe and on the road. Today’s maritime ships are a similar blend of machinery and software. From computers to networks and satellites, the modern ship purrs with an electronic hum, but also includes more mechanical tools like winches, cranes, engines, and bilge pumps. But the very same seamless systems that help ships run smoothly can be compromised. Like cars, ships must be protected against potential hackers and other malicious actors.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Expert Interview: Sean Peisert on Cybersecurity Research</title>
      <link>https://peisert.net/blog/2025/08/12/expert-interview-sean-peisert-on-cybersecurity-research/</link>
      <pubDate>Wed, 30 Jul 2025 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2025/08/12/expert-interview-sean-peisert-on-cybersecurity-research/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;In this 10-minute audio interview, cybersecurity expert Sean Peisert shares how Berkeley Lab advances research that protects high-performance computing, the power grid, and more.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Listen to the &lt;a href=&#34;https://newscenter.lbl.gov/2025/07/30/expert-interview-sean-peisert-on-cybersecurity-research/&#34;&gt;interview&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cybersecurity Center of Excellence Receives Five-Year, $6M/Year Award From NSF</title>
      <link>https://peisert.net/blog/2024/10/03/cybersecurity-center-of-excellence-receives-five-year-nsf-award/</link>
      <pubDate>Thu, 03 Oct 2024 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2024/10/03/cybersecurity-center-of-excellence-receives-five-year-nsf-award/</guid>
      <description>&lt;p&gt;The U.S. National Science Foundation has awarded Trusted CI, the NSF Cybersecurity Center of Excellence, a five-year, $6-million per-year award to run through September 2029. Lawrence Berkeley National Laboratory (Berkeley Lab) will now serve as Trusted CI’s central steward.&lt;/p&gt;&#xA;&lt;p&gt;Trusted CI empowers trustworthy discovery and innovation funded by NSF by partnering with research cyberinfrastructure (CI) operators to build and maintain effective cybersecurity programs that secure the progress of NSF-funded research. The center started in 2012 and consists of a multi-institutional, cross-functional team that addresses the complex challenges facing NSF’s cyberinfrastructure research ecosystem.&lt;/p&gt;</description>
    </item>
    <item>
      <title>International Computing Society Recognizes 2023 Distinguished Members for Significant Achievements</title>
      <link>https://peisert.net/blog/2024/01/17/international-computing-society-recognizes-2023-distinguished-members/</link>
      <pubDate>Wed, 17 Jan 2024 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2024/01/17/international-computing-society-recognizes-2023-distinguished-members/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;New York, NY, January 17, 2024 – ACM, the Association for Computing Machinery, has named &lt;a href=&#34;https://awards.acm.org/distinguished-members&#34;&gt;52 Distinguished Members&lt;/a&gt; for significant contributions. All the 2023 inductees are longstanding ACM Members and were selected by their peers for work that has advanced computing, fostered innovation across various fields, and improved computer science education.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Read more in the &lt;a href=&#34;https://www.acm.org/media-center/2024/january/distinguished-members-2023&#34;&gt;ACM Media Center&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Berkeley Lab Leading the Way with New Cybersecurity Projects</title>
      <link>https://peisert.net/blog/2023/11/06/leading-the-way-with-new-cybersecurity-projects/</link>
      <pubDate>Mon, 06 Nov 2023 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2023/11/06/leading-the-way-with-new-cybersecurity-projects/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The U.S. Department of Energy’s Office of Cybersecurity, Energy Security, and Emergency Response (CESER) recently announced $39 million in funding for nine new National Laboratory projects to advance the cybersecurity of distributed energy resources (DERs), including two projects led by Lawrence Berkeley National Laboratory (Berkeley Lab) that will each receive $4.9 million in funding from CESER. The National Laboratory teams aim to improve real-time DER operation data analytics using artificial intelligence (AI)/machine learning (ML) and secure cloud-based solutions for DER applications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Updates on Trusted CI’s Efforts in Cybersecurity by Design of NSF Academic Maritime Facilities</title>
      <link>https://peisert.net/blog/2023/07/24/updates-on-trusted-ci-maritime-cybersecurity-by-design-of-maritime-facilities/</link>
      <pubDate>Mon, 24 Jul 2023 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2023/07/24/updates-on-trusted-ci-maritime-cybersecurity-by-design-of-maritime-facilities/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;As part of its “Annual Challenge” in 2023, Trusted CI has been engaging with current and future NSF Major Facilities undergoing design or construction with the goal of building security into those Facilities from the outset.  To date, this effort has focused on working with cyberinfrastructure operators in the the academic maritime domain, and has included support of the cybersecurity aspects of the acceptance testing process of the NSF-funded Research Class Research Vessels (RCRVs) at Oregon State University as well as Scripps Institution of Oceanography’s design of the California Coastal Research Vessel (CCRV).  These vessels are all expected to eventually become a part of the U.S. Academic Research Fleet (ARF).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Registration Open for 3rd HPC Security Workshop at NIST NCCoE</title>
      <link>https://peisert.net/blog/2023/02/03/register-nist-3rd-hpc-workshop/</link>
      <pubDate>Fri, 03 Feb 2023 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2023/02/03/register-nist-3rd-hpc-workshop/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Trusted CI is participating in the 3rd HPC Security Workshop, hosted by NIST’s National Cybersecurity Center of Excellence (NCCoE). The goal of the workshop is to gather community feedback, share the work of the HPC security working group, and to plan future tasks.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&amp;hellip;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;On Thursday, Erik Deumens, member of Trusted CI partner Regulated Research Community of Practice (RRCoP), will be participating in a presentation on HPC security research. Later, Trusted CI Deputy Director Sean Peisert will present the final keynote on secure data sharing in HPC environments.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Announcing the 2023 Trusted CI Annual Challenge: Building Security Into NSF Major Facilities By Design</title>
      <link>https://peisert.net/blog/2023/01/25/announcing-2023-trusted-ci-annual/</link>
      <pubDate>Wed, 25 Jan 2023 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2023/01/25/announcing-2023-trusted-ci-annual/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The Trusted CI Annual Challenge is a year-long project focusing on a cybersecurity topic of importance for scientific computing environments.  In its first year, the Trusted CI Annual Challenge focused on improving trustworthy data for open science.  In its second year, the Annual Challenge focused on software assurance in scientific computing.  In its third year, 2022, the Annual Challenge focused on the security of operational technology in science.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Read more at the &lt;a href=&#34;https://blog.trustedci.org/2023/01/announcing-2023-trusted-ci-annual.html&#34;&gt;Trusted CI Blog&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Trusted Execution Environments Make Computing More Private</title>
      <link>https://peisert.net/blog/2022/12/05/trusted-execution-environments-make-computing-more-private/</link>
      <pubDate>Mon, 05 Dec 2022 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2022/12/05/trusted-execution-environments-make-computing-more-private/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Intel, AMD, ARM, and other chip makers now offer TEEs &amp;ndash; and cloud providers such as Google, Microsoft and AWS are building the technology into their frameworks. “These environments provide certain guarantees about the confidentiality and integrity of computing that is taking place within them,” states Sean Peisert, a senior scientist at Berkeley Lab and an adjunct professor of computer science at the University of California, Davis.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&amp;hellip;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Meanwhile, researchers such as Berkeley Lab’s Peisert are studying ways to extend the functionality of TEEs through open standard RISC-V processors. This would open the black box of chip and BIOS engineering for close examination &amp;ndash; and make it possible for organizations to develop instruction set extensions and other features that address specific security needs. “This approach would add an additional layer of protection because it would be possible to have clear evidence that the processor hardware is secure,” Peisert says.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Publication of the Trusted CI Roadmap for Securing Operational Technology in NSF Scientific Research</title>
      <link>https://peisert.net/blog/2022/11/16/publication-of-the-trusted-ci-roadmap-for-securing-ot/</link>
      <pubDate>Wed, 16 Nov 2022 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2022/11/16/publication-of-the-trusted-ci-roadmap-for-securing-ot/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Trusted CI is pleased to announce the publication of its Roadmap for Securing Operational Technology in NSF Scientific Research.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;In 2022, Trusted CI conducted a year-long effort examining the security of operational technology in science. Operational technology (OT) encompasses broad categories of computing and communication systems that in some way interact with the physical world.  This includes devices that either have sensing elements or control elements, or some combination of the two, and can include both bespoke scientific instrumentation as well as commercially-produced OT.  In both cases, networked sensors and control systems are increasingly important in the context of science as they are critical in operating Major Facilities.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Science Cyber Risk Profile (OSCRP) Updated with Science DMZ, Software Assurance, Operational Technology, and Cloud Computing Elements</title>
      <link>https://peisert.net/blog/2022/11/01/open-science-cyber-risk-profile-updated/</link>
      <pubDate>Tue, 01 Nov 2022 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2022/11/01/open-science-cyber-risk-profile-updated/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Trusted CI has released an updated version of the Open Science Cyber Risk Profile (OSCRP), with additions based on insights from its 2021 study of scientific software assurance and its 2022 study on scientific operational technology.  A new section on risk profiling of  cloud computing was also added.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Read more at the &lt;a href=&#34;https://blog.trustedci.org/2022/11/open-science-cyber-risk-profile-oscrp.html&#34;&gt;Trusted CI Blog&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Scientific Data Division Summer Students Tackle Data Privacy</title>
      <link>https://peisert.net/blog/2022/09/15/scientific-data-division-summer-students-tackle-data-privacy/</link>
      <pubDate>Thu, 15 Sep 2022 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2022/09/15/scientific-data-division-summer-students-tackle-data-privacy/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Ammar Haydari, a Ph.D. student at the University of California Davis, and a Lawrence Berkeley National Laboratory (Berkeley Lab) Affiliate grew up in Istanbul, Turkey, the eldest child in a big family where scientific exploration was always encouraged. He sees his parents’ encouragement as instrumental in getting him to where he is now.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&amp;hellip;&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;“I am tremendously impressed with what Ammar produced over the past couple of years,” noted Peisert. “We had a problem where important data wasn’t available for research purposes because it contained personally identifiable information and so couldn’t be handed out to researchers, even with the proper legal agreements. Ammar has developed and demonstrated a technical solution that enables this type of research to continue by addressing the privacy concerns while maintaining the usefulness of the data.”&lt;/p&gt;</description>
    </item>
    <item>
      <title>Findings of the 2022 Trusted CI Study on the Security of Operational Technology in NSF Scientific Research</title>
      <link>https://peisert.net/blog/2022/07/15/findings-of-the-2022-trusted-ci-study-on-the-security-of-operational-technology-in-nsf-scientific-research/</link>
      <pubDate>Fri, 15 Jul 2022 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2022/07/15/findings-of-the-2022-trusted-ci-study-on-the-security-of-operational-technology-in-nsf-scientific-research/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;This year, Trusted CI is conducting a year-long effort on the security of operational technology in science. Operational technology (OT) encompasses broad categories of computing and communication systems that in some way interact with the physical world.  This includes devices that either have sensing elements or control elements, or some combination of the two.  Networked sensors and control systems are increasingly important in the context of science as they are critical in  operating scientific instruments.  Trusted CI is pleased to share its findings from this study&amp;hellip;&amp;quot;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sean Peisert Tapped to Take on Deputy Director Role at Trusted CI</title>
      <link>https://peisert.net/blog/2022/06/28/sean-peisert-tapped-to-take-on-deputy-director-role-at-trusted-ci/</link>
      <pubDate>Tue, 28 Jun 2022 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2022/06/28/sean-peisert-tapped-to-take-on-deputy-director-role-at-trusted-ci/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Trusted CI, the NSF Cybersecurity Center of Excellence, today announced that Sean Peisert has been tapped to serve as its Deputy Director on the leadership team of the organization. Peisert, a Lawrence Berkeley National Laboratory (Berkeley Lab) senior scientist in the Scientific Data Division, joined the organization in 2019 and “has made strong leadership contributions” according to the post.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://cs.lbl.gov/news-media/news/2022/berkeley-labs-sean-peisert-tapped-to-take-on-deputy-director-role/&#34;&gt;Read more at Berkeley Lab Computing Sciences News&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Announcement of Trusted CI Director Transition</title>
      <link>https://peisert.net/blog/2022/06/27/announcement-of-trusted-ci-director-transition/</link>
      <pubDate>Mon, 27 Jun 2022 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2022/06/27/announcement-of-trusted-ci-director-transition/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;&amp;hellip;I’m happy to also share that Jim will receive similar support from Sean Peisert, who has agreed to serve as Trusted CI Deputy Director going forward. Since Sean joined Trusted CI in 2019 he has made strong leadership contributions, including serving as a co-PI the last year  and leading annual challenges and the OSCRP effort.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Read more at the &lt;a href=&#34;https://blog.trustedci.org/2022/06/announcement-of-trusted-ci-director.html&#34;&gt;Trusted CI Blog&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Better Scientific Software (BSSw) Helps Promote Trusted CI Guide to Securing Scientific Software</title>
      <link>https://peisert.net/blog/2022/05/13/better-scientific-software-helps-promote-trusted-ci-guide-to-securing-software/</link>
      <pubDate>Fri, 13 May 2022 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2022/05/13/better-scientific-software-helps-promote-trusted-ci-guide-to-securing-software/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Trusted CI is grateful to Better Scientific Software (BSSw) for helping to publicize the results of Trusted CI’s software security study, including its recently published findings report and Guide to Securing Scientific Software (GS3), via its widely-read blog.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Read more at the &lt;a href=&#34;https://https://blog.trustedci.org/2022/05/better-scientific-software-bssw-helps.html&#34;&gt;Trusted CI Blog&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Announcing the 2022 Trusted CI Annual Challenge on Scientific OT/CPS Security</title>
      <link>https://peisert.net/blog/2022/01/06/announcing-the-2022-trusted-ci-annual-challenge-on-scientific-ot-cps-security/</link>
      <pubDate>Thu, 06 Jan 2022 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2022/01/06/announcing-the-2022-trusted-ci-annual-challenge-on-scientific-ot-cps-security/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The Trusted CI Annual Challenge is a year-long project focusing on a cybersecurity topic of importance for scientific computing environments.  In its first year, the Trusted CI Annual Challenge focused on improving trustworthy data for open science.  In its second year, the Annual Challenge focused on software assurance in scientific computing.  Now in its third year, the Annual Challenge is focusing on the security of “operational technology” or “cyber-physical systems” in science.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Publication of the Trusted CI Guide to Securing Scientific Software</title>
      <link>https://peisert.net/blog/2021/12/14/publication-of-the-trusted-ci-guide-to-securing-scientific-software/</link>
      <pubDate>Tue, 14 Dec 2021 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2021/12/14/publication-of-the-trusted-ci-guide-to-securing-scientific-software/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Trusted CI is pleased to announce the publication of its Guide to Securing Scientific Software (GS3).  The GS3 was produced over the course of 2021 by seven Trusted CI members with the goal of broadly improving the robustness of software used in scientific computing with respect to security. GS3 is the result of  the 2021 Trusted CI Annual Challenge on Software Assurance and the interviews we conducted with seven prominent scientific software development projects,  helping to  shape the team’s ideas about the community’s needs in software assurance.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Initial Findings of the 2021 Trusted CI Annual Challenge on Software Assurance</title>
      <link>https://peisert.net/blog/2021/08/03/annual-challenge-software-assurance-initial-findings/</link>
      <pubDate>Tue, 03 Aug 2021 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2021/08/03/annual-challenge-software-assurance-initial-findings/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;In 2021, Trusted CI is conducting our focused “annual challenge” on the assurance of software used by scientific computing and cyberinfrastructure. The goal of this year-long project, involving seven Trusted CI members, is to broadly improve the robustness of software used in scientific computing with respect to security. The Annual Challenge team spent the first half of the 2021 calendar year engaging with developers of scientific software to understand the range of software development practices used and identifying opportunities to improve practices and code implementation to minimize the risk of vulnerabilities. In this blog post, the 2021 Trusted CI Annual Challenge team gives a high-level description of some of its more important findings during the past six months.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Trusted CI new co-PIs: Peisert and Shute</title>
      <link>https://peisert.net/blog/2021/08/03/trusted-ci-new-co-pis-peisert-shute/</link>
      <pubDate>Tue, 03 Aug 2021 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2021/08/03/trusted-ci-new-co-pis-peisert-shute/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;I am happy to announce that Sean Peisert and Kelli Shute have taken on co-PI roles with Trusted CI. Both already have substantial leadership roles with Trusted CI. Sean is leading the 2021 annual challenge on software assurance and Kelli has been serving as Trusted CI’s Executive Director since August of 2020.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Thank you to Sean and Kelli for being willing to step up and take on these responsibilities.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Von&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sean Peisert Named to DARPA ISAT Study Group</title>
      <link>https://peisert.net/blog/2021/06/21/peisert-named-to-darpa-isat/</link>
      <pubDate>Wed, 16 Jun 2021 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2021/06/21/peisert-named-to-darpa-isat/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The Defense Advanced Research Projects Agency (DARPA) has named Berkeley Lab’s cybersecurity expert Sean Peisert to the Information Science and Technology (ISAT) Study Group for a three-year term beginning this summer. The group brings 30 of the brightest scientists and engineers together to identify new areas of development in computer and communication technologies and to recommend future research directions.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://crd.lbl.gov/news-and-publications/news/2021/sean-peisert-named-to-darpa-isat-study-group/&#34;&gt;Read more at Berkeley Lab Computing Sciences News&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>CIGAR &#39;Smokes Out&#39; Attacks on Solar Electrical Power Equipment</title>
      <link>https://peisert.net/blog/2021/06/07/cigar-smokes-out-attacks/</link>
      <pubDate>Mon, 07 Jun 2021 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2021/06/07/cigar-smokes-out-attacks/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;As green energy becomes more prevalent, solar arrays are seen as among the most promising methods for generating sustainable electricity. At the same time, inverters - the “brains” of the system, converting DC power generated by the panels to AC power ingested by the grid - are also becoming smarter, adding adaptive capabilities to respond to changing conditions in the grid.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Yet, like so many other network-connected devices, solar inverters and other equipment find themselves in the vulnerable position of being connected to networks without the traditional security protections offered to PCs, servers, and network appliances. A determined attacker could access the inverters connected to these panels and, by manipulating their settings, potentially create disturbances that could cause outages or damage to certain equipment connected to the grid.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Announcing the 2021 Trusted CI Annual Challenge on Software Assurance</title>
      <link>https://peisert.net/blog/2021/03/30/trusted-ci-annual-challenge-software-assurance/</link>
      <pubDate>Tue, 30 Mar 2021 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2021/03/30/trusted-ci-annual-challenge-software-assurance/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The Trusted CI “Annual Challenge” is a year-long project focusing on a particular topic of importance to cybersecurity in scientific computing environments.  In its first year, the Trusted CI Annual Challenge focused on issues in trustworthy data.  Now, in its second year, the Annual Challenge is focusing on software assurance in scientific computing.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Read more at the &lt;a href=&#34;https://blog.trustedci.org/2021/03/announcing-2021-trusted-ci-annual.html&#34;&gt;Trusted CI Blog&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Summer Students Tackle COVID-19</title>
      <link>https://peisert.net/blog/2020/10/21/summer-students-support-covid-19/</link>
      <pubDate>Wed, 21 Oct 2020 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2020/10/21/summer-students-support-covid-19/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;With near-daily changes in the understanding of SARS-CoV-2 and how COVID-19 is transmitted and spread, researchers are challenged with mountains of data in the race to end the outbreak. Adding to that, the inaccessibility of high-quality electronic health records (EHRs) creates a challenge for researchers needing more complete information to map the viral outbreak and fully understand its broader impact on health.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&amp;hellip;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;As a part of the Computational Research Division’s (CRD) summer student program at Lawrence Berkeley National Laboratory, four graduate students from the University of California, Davis (UC Davis) researched a method that could allow doctors and researchers to leverage valuable health information in the battle against COVID-19 while also preserving patient privacy in COVID-19-related EHRs. The students worked to support the COVID-19 response by using actual EHR data and applying differential privacy, a data-driven approach first published in 2006 that provides strong, statistical privacy guarantees while balancing privacy and the utility of data for use in machine learning and other analyses. Differential privacy is widely used by companies like Apple, Google, and Microsoft, as well as the U.S. Census Bureau and the United Nations, among others.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Data Confidentiality Issues and Solutions in Academic Research Computing</title>
      <link>https://peisert.net/blog/2020/09/10/data-confidentiality-in-research-computing/</link>
      <pubDate>Thu, 10 Sep 2020 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2020/09/10/data-confidentiality-in-research-computing/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Many universities have needs for computing with “sensitive” data, such as data containing protected health information (PHI), personally identifiable information (PII), or proprietary information.  Sometimes this data is subject to legal restrictions, such as those imposed by HIPAA, CUI, FISMA, DFARS, GDPR, or the CCPA, and at other times, data may simply not be sharable per a data use agreement.  It may be tempting to think that such data is typically only in the domain of DOD and NIH funded research, but it turns out that this assumption is far from reality.  While this issue arises in numerous scientific domains, including ones that people might immediately think of, such as medical research, it also arises in numerous others, including economics, sociology, and other social sciences that might look at financial data, student data or psychological records; chemistry and biology particularly that which relates to genomic analysis and pharmaceuticals, manufacturing, and materials; engineering analyses, such as airflow dynamics; underwater acoustics; and even computer science and data analysis, including advanced AI research, quantum computing, and research involving system and network logs.  Such research is funded by an array of sponsors, including the National Science Foundation (NSF) and private foundations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sean Peisert named editor-in-chief of IEEE Security and Privacy</title>
      <link>https://peisert.net/blog/2020/07/10/peisert-named-editor-in-chief-of-ieee-sp/</link>
      <pubDate>Fri, 10 Jul 2020 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2020/07/10/peisert-named-editor-in-chief-of-ieee-sp/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Sean Peisert, who leads the computer security research and development team in Lawrence Berkeley National Laboratory’s (Berkeley Lab’s) Computational Research Division, has been named the new editor-in-chief of the peer-reviewed journal, IEEE Security and Privacy. Peisert, who is currently an associate editor-in-chief, will begin his new, three-year appointment on January 1, 2021.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;IEEE Security and Privacy is the Institute of Electrical and Electronics Engineers (IEEE) Computer Society’s peer-reviewed journal on computer security, publishing research, case studies, tutorials and reviews on the security and dependability of computer-based systems. Its goal is to disseminate work with both a practical and research emphasis from top scholars in academia, industry and government.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fantastic Bits and Why They Flip</title>
      <link>https://peisert.net/blog/2020/06/23/fantastic-bits/</link>
      <pubDate>Tue, 23 Jun 2020 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2020/06/23/fantastic-bits/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;In 2019, Trusted CI examined the causes of random bit flips in scientific computing and common measures used to mitigate the effects of “bit flips.”  (In a separate effort, we will also be issuing a similar report on data confidentiality needs in science, as well.) Its report, “An Examination and Survey of Random Bit Flips and Scientific Computing,” was issued a few days before the winter holidays in December 2019. As news of the report was buried amidst the winter holidays and New Year, we are pleased to highlight the report in a bit more detail now. This post is longer than most of Trusted CI’s blog posts to give you a feel for the report and hopefully entice you to read it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19</title>
      <link>https://peisert.net/blog/2020/04/14/isolating-insecurely-a-call-to-arms-for-the-security-and-privacy-community-during-covid-19/</link>
      <pubDate>Tue, 14 Apr 2020 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2020/04/14/isolating-insecurely-a-call-to-arms-for-the-security-and-privacy-community-during-covid-19/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Let&amp;rsquo;s begin by saying this was not the letter I had originally planned on writing. However, I have the dubious distinction of writing this piece while the world is dealing with the coronavirus (COVID-19) pandemic. As I write this note, well over 1 million confirmed cases have been reported, and tens of thousands of people have died from the disease. Surely those figures will have risen substantially by the time this column will be published. Very thankfully, hundreds of thousands more who were positively diagnosed have now recovered.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Using Physics to Keep Our Electrical Grid Safe</title>
      <link>https://peisert.net/blog/2019/10/24/using-physics-to-keep-out-electrical-grid-safe/</link>
      <pubDate>Thu, 24 Oct 2019 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2019/10/24/using-physics-to-keep-out-electrical-grid-safe/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Many of the systems that provide services or products we use daily, such as the electrical grid, oil and gas pipelines, vehicles, and manufacturing plants, are examples of cyberphysical systems – systems that integrate computing and networking with one or more physical components.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Berkeley Lab researcher Sean Peisert (Credit: Marilyn Chung/Berkeley Lab)&#xA;Computer security specialist Sean Peisert and a team of researchers at Berkeley Lab are helping ensure that these systems stay secure from cyberattacks. The team has collaborated with utilities and utility equipment companies on numerous projects to use the physical components of electrical grids – and the laws of physics they are subject to – to keep cyberattacks at bay.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Impact of AI on Cybersecurity in DOE National Laboratories</title>
      <link>https://peisert.net/blog/2019/09/29/impact-ai-doe-national-labs-security/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2019/09/29/impact-ai-doe-national-labs-security/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://youtu.be/gLqVDrraLIc?t=67&#34;&gt;Impact of AI in DOE National Laboratories (YouTube video) (security discussion at 1&#39;07&amp;quot;)&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Solar power opens up new targets for cyber attackers</title>
      <link>https://peisert.net/blog/2019/05/30/solar-power-opens-up-new-targets-for-cyber-attackers/</link>
      <pubDate>Thu, 30 May 2019 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2019/05/30/solar-power-opens-up-new-targets-for-cyber-attackers/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The sun is powering the equivalent of 12 million homes in the U.S., recent numbers show.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;That’s more homes than people in the state of Ohio, all running on sunshine.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;But is the solar energy system secure?&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Cyber attackers shut off power in Ukraine in 2015 and 2016.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Researchers are trying to make sure the same kind of thing doesn’t happen in the U.S. with solar.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&amp;hellip;&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;“We all are all essentially interconnected neighbors in this regard,” said Sean Peisert, also with Lawrence Berkeley National Laboratory.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cyberattacks threaten smart inverters, but scientists have solutions</title>
      <link>https://peisert.net/blog/2019/04/30/cyberattacks-threaten-smart-inverters-but-scientists-have-solutions/</link>
      <pubDate>Tue, 30 Apr 2019 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2019/04/30/cyberattacks-threaten-smart-inverters-but-scientists-have-solutions/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Smart inverters expand opportunities for more distributed resources on the grid. But the internet-enabled communications that allow smart inverters to work with the grid also open the door for something sinister.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&amp;hellip;&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Scientists at Lawrence Berkeley National Lab have been working on solutions to combat cybersecurity threats on smart inverters since 2016. They’ve found some promising solutions to inevitable hacks, but also some serious challenges that come with the growing proliferation of smart inverters.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Some Experiences in Developing Security Technology That Actually Gets Used</title>
      <link>https://peisert.net/blog/2019/02/15/some-experiences-in-developing-seurity-technology-that-actually-gets-used/</link>
      <pubDate>Fri, 15 Feb 2019 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2019/02/15/some-experiences-in-developing-seurity-technology-that-actually-gets-used/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Researchers do research for all kinds of reasons – because we want to learn more about the subject matter, because we like working with the other people who do research, or the places where research is done, or just like the research process. Or perhaps because we want to figure out what makes something work, or to solve a problem. Many reasons exist, each just as valid as any other. In my own work, a few years ago, I noticed that I was gradually shifting toward wanting to do something that other people used and found useful. At the same time, though I didn’t really notice it until much later, successfully making that change was much harder than&#xA;I thought it would be at the outset. “Just pick a practical problem that other people need solved, and solve it, right?” The ability to just pick a practical problem and charge in has definitely not been true, at least for me.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Berkeley Lab Cybersecurity Specialist Highlights Data Sharing Benefits, Challenges at NAS Meeting</title>
      <link>https://peisert.net/blog/2018/12/04/berkeley-lab-cybersecurity-expert-highlights-data-sharing-at-national-academies-meeting/</link>
      <pubDate>Tue, 04 Dec 2018 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2018/12/04/berkeley-lab-cybersecurity-expert-highlights-data-sharing-at-national-academies-meeting/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;There are many reasons why data isn’t widely shared by organizations that collect it or between scientists who analyze it in search of new scientific insights. This topic, and ways to overcome those barriers in a world of data-driven science, was the subject of a National Academy of Sciences, National Academy of Engineering, and the National Academy of Medicine &lt;a href=&#34;http://sites.nationalacademies.org/cs/groups/pgasite/documents/webpage/pga_189637.pdf&#34;&gt;recent meeting&lt;/a&gt; of the &lt;a href=&#34;http://sites.nationalacademies.org/pga/cosepup/&#34;&gt;Committee on Science, Engineering, Medicine, and Public Policy (COSEMPUP)&lt;/a&gt;, a joint unit of the &lt;a href=&#34;http://www.nationalacademies.org&#34;&gt;National Academies&lt;/a&gt;, which took place on November 8, 2018, in Washington, D.C.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CRD&#39;s Peisert to Discuss Data Sharing at National Academies&#39; COSEMPUP Meeting</title>
      <link>https://peisert.net/blog/2018/11/05/crds-sean-peisert-to-discuss-data-sharing-at-national-academies-cosempup-meeting/</link>
      <pubDate>Mon, 05 Nov 2018 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2018/11/05/crds-sean-peisert-to-discuss-data-sharing-at-national-academies-cosempup-meeting/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Sean Peisert, a cybersecurity expert in the Lab’s Computational Research Division, will be part of two panels of distinguished speakers on the topic of data sharing at a meeting of the Committee on Science, Engineering, Medicine, and Public Policy, a joint unit of the National Academies of Sciences, Engineering, and Medicine, on Nov. 8 in Washington, D.C.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;His talk will describe how the strategic use of computer security and privacy preserving techniques can be used to overcome certain traditional barriers involved in data sharing and serve as a means to facilitate, enhance, and incentivize increased data sharing in the sciences, thereby accelerating data-drive scientific discovery.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Expert Q&amp;A Safeguarding the Nation&#39;s Energy Infrastructure</title>
      <link>https://peisert.net/blog/2018/10/26/expert-qa-safeguarding-the-nations-energy-infrastructure/</link>
      <pubDate>Fri, 26 Oct 2018 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2018/10/26/expert-qa-safeguarding-the-nations-energy-infrastructure/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;In recognition of National Cybersecurity Awareness Month, Sean Peisert, a cybersecurity expert and staff scientist in the Lab’s Computational Research Division, discusses new methods that have the potential to keep our energy infrastructure safe from a cyberattack.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://today.lbl.gov/2018/10/26/expert-qa-safeguarding-the-nations-energy-infrastructure/&#34;&gt;Read more at Today at Berkeley Lab&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Berkeley Lab Contributes to $2.5M supplemental grant for NSF-funded Cybersecurity Center of Excellence</title>
      <link>https://peisert.net/blog/2018/10/05/nsf-funded-cybersecurity-center-of-excellence/</link>
      <pubDate>Fri, 05 Oct 2018 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2018/10/05/nsf-funded-cybersecurity-center-of-excellence/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The National Science Foundation (NSF) has awarded Trusted CI, the NSF Cybersecurity Center of Excellence (CCoE) a $2.5 million supplemental grant to extend the CCoE through 2019 and expand its activities. The Department of Energy’s Lawrence Berkeley National Laboratory (Berkeley Lab) and Oklahoma State University are joining the collaboration to support the CCoE’s expanded activities, which will be to assist in transitioning cybersecurity research into practice in order to better secure the NSF community, creating a Cybersecurity Fellows program to broaden the impact of the CCoE, and creating an Open Science Cybersecurity Framework.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cyber Defense Tool Is an Early Warning System for Grid Attacks</title>
      <link>https://peisert.net/blog/2018/03/27/cyber-defense-tool-targets-grid-vulnerability/</link>
      <pubDate>Tue, 27 Mar 2018 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2018/03/27/cyber-defense-tool-targets-grid-vulnerability/</guid>
      <description>&lt;h2 id=&#34;a-new-tool-will-enable-grid-operators-to-better-detect-not-only-a-brutal-physical-attack-but-also-a-hacker-probing-for-vulnerabilities&#34;&gt;A new tool will enable grid operators to better detect not only a brutal physical attack, but also a hacker probing for vulnerabilities&lt;/h2&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;A rifle attack on an electrical substation near California’s Silicon Valley in April 2013 led to the development of a new tool for grid operators that will enable them to better detect not only a brutal physical attack but also the slightest hint of a hacker looking for vulnerabilities in these critical links in the grid.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Into the Medical Science DMZ</title>
      <link>https://peisert.net/blog/2018/03/23/into-the-medical-science-dmz/</link>
      <pubDate>Fri, 23 Mar 2018 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2018/03/23/into-the-medical-science-dmz/</guid>
      <description>&lt;h2 id=&#34;a-new-model-for-research-networks-protects-patient-privacy-while-improving-data-transfer-rates-for-scientists&#34;&gt;A new model for research networks protects patient privacy while improving data transfer rates for scientists.&lt;/h2&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;a href=&#34;http://www.wikiwand.com/en/Health_Insurance_Portability_and_Accountability_Act&#34;&gt;Privacy Rule&lt;/a&gt; The 1996 Health Insurance Portability and Accountability Act (HIPAA) is best known for preserving insurance coverage for employees who change or lose their jobs. But the law also includes a &lt;a href=&#34;https://www.hhs.gov/hipaa/for-professionals/security/&#34;&gt;Security Rule&lt;/a&gt; and a &lt;a href=&#34;https://www.hhs.gov/hipaa/for-professionals/privacy/&#34;&gt;Privacy Rule&lt;/a&gt; that protect confidential healthcare data for consumers.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&amp;hellip;&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;In &lt;a href=&#34;https://academic.oup.com/jamia/article/doi/10.1093/jamia/ocx104/4367749/The-medical-science-DMZ-a-network-design-pattern&#34;&gt;their paper&lt;/a&gt;, &lt;a href=&#34;http://www.lbl.gov/&#34;&gt;Lawrence Berkeley National Laboratory (LBNL)&lt;/a&gt; computer scientist &lt;a href=&#34;https://www.cs.ucdavis.edu/~peisert/&#34;&gt;Sean Peisert&lt;/a&gt; and &lt;a href=&#34;https://www.es.net/&#34;&gt;Energy Sciences Network (ESnet)&lt;/a&gt; researcher &lt;a href=&#34;https://www.es.net/about/esnet-staff/science-engagement/Eli-Dart/&#34;&gt;Eli Dart&lt;/a&gt; and their collaborators outline a &amp;ldquo;design pattern&amp;rdquo; for deploying specialized research networks and ancillary computing equipment for HIPAA-protected biomedical data that provides high-throughput network data transfers and high-security protections.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Berkeley Lab Researchers Contribute to Making Blockchains Even More Robust</title>
      <link>https://peisert.net/blog/2018/01/30/making-blockchains-even-more-robust/</link>
      <pubDate>Tue, 30 Jan 2018 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2018/01/30/making-blockchains-even-more-robust/</guid>
      <description>&lt;h2 id=&#34;hyperledger-iroha-project-notes-that-this-work-heavily-inspired-their-protocol&#34;&gt;Hyperledger Iroha project notes that this work heavily inspired their protocol&lt;/h2&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Blockchain—a technology used for verifying and recording digital transactions—blasted into public consciousness with the rise of &lt;a href=&#34;https://www.technologyreview.com/s/424091/what-bitcoin-is-and-why-it-matters/&#34;&gt;Bitcoin&lt;/a&gt;. But this tool could also transform the way governments, global industries and even &lt;a href=&#34;https://www.nature.com/articles/d41586-017-08589-4&#34;&gt;science research&lt;/a&gt; operate. In fact, several banks, corporations, governments and scientists have already implemented some form of blockchain to inexpensively, securely and expediently store and share information.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;In the last few years, researchers at Lawrence Berkeley National Laboratory (Berkeley Lab), University of California at Davis (UC Davis) and University of Stavanger in Norway have developed a new protocol, called BChain, which makes blockchain even more robust. A paper describing BChain was published in the &lt;a href=&#34;http://web.cs.ucdavis.edu/~peisert/research/2014-OPODIS-BChain.pdf&#34;&gt;Proceedings of the 18th International Conference on Principles of Distributed Systems&lt;/a&gt;.  The researchers are also working with colleagues at Berkeley Lab and beyond to adapt this tool to support applications that are of strategic importance to the Department of Energy’s (DOE) Office of Science. &lt;/p&gt;</description>
    </item>
    <item>
      <title>Berkeley Lab Aims to Strengthen the Cybersecurity of the Grid</title>
      <link>https://peisert.net/blog/2017/09/26/strengthen-cybersecurity-of-the-grid/</link>
      <pubDate>Tue, 26 Sep 2017 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2017/09/26/strengthen-cybersecurity-of-the-grid/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;As the U.S. electricity grid continues to modernize, it will mean things like better reliability and resilience, lower environmental impacts, greater integration of renewable energy, as well as new computing and communications technologies to monitor and manage the increasing number of devices that connect to the grid. However, that enhanced connectivity for grid operators and consumers also opens the door to potential cyber intrusions.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;As part of the Department of Energy’s (DOE’s) commitment to building cyber-resilient energy delivery systems, a new project led by Lawrence Berkeley National Laboratory (Berkeley Lab) will develop tools to detect and counter certain types of cyber attacks on the grid. The project has been awarded up to $2.5 million in funding over three years by DOE, one of 20 projects for cybersecurity on the grid announced recently.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Helping Scientists Understand Research Cyber Risks</title>
      <link>https://peisert.net/blog/2017/09/20/helping-scientists-understand-cyber-risks/</link>
      <pubDate>Wed, 20 Sep 2017 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2017/09/20/helping-scientists-understand-cyber-risks/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Cyber attacks don’t just hit big corporations or governments or hospitals. Anything connected to networks is vulnerable, and that includes research and open science.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;In general, scientists who use computers and other devices plugged into computer networks are aware of cyber threats. Often though they have little knowledge about the specific threats to systems like theirs, what to do about them, or the degree to which these threats target open science projects.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Berkeley Lab&#39;s cybersecurity expert Sean Peisert discusses challenges &amp; opportunities of securing HPC</title>
      <link>https://peisert.net/blog/2017/08/24/hpc-security/</link>
      <pubDate>Thu, 24 Aug 2017 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2017/08/24/hpc-security/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Berkeley Lab&amp;rsquo;s cybersecurity expert Sean Peisert discusses challenges &amp;amp; opportunities of securing HPC&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://twitter.com/LBNLcs/status/900819240734920704&#34;&gt;Twitter link&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://cacm.acm.org/magazines/2017/9/220422-security-in-high-performance-computing-environments/fulltext&#34;&gt;HPC security article in Communications of the ACM&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://vimeo.com/226955144&#34;&gt;Video accompanying HPC security article on Vimeo&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open-Source Software Won&#39;t Ensure Election Security</title>
      <link>https://peisert.net/blog/2017/08/24/open-source-software-will-not-ensure-election-security/</link>
      <pubDate>Thu, 24 Aug 2017 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2017/08/24/open-source-software-will-not-ensure-election-security/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The technology behind elections is hard to get right. Elections require security. They also require transparency: anyone should be able to observe enough of the election process, from distribution of ballots, to the counting and canvassing of votes, to verify that the reported winners really won. But if people vote on computers or votes are tallied by computers, key steps of the election are not transparent and additional measures are needed to confirm the results.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cybersecurity: New Directions for Research and Education Networks</title>
      <link>https://peisert.net/blog/2017/05/26/cybersecurity-new-directions-rande/</link>
      <pubDate>Fri, 26 May 2017 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2017/05/26/cybersecurity-new-directions-rande/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;A panel of recognized national experts in online security was convened during CENIC’s recent 20th Anniversary conference focused on sorting through the various models of securing what was widely recognized as “insecurable” by those in attendance.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Moderator Sean Peisert, CENIC’s Chief Cybersecurity Strategist, set the tone in his opening comments that focused on both the vulnerabilities and strengths of the network community.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;“This notion of community makes us collectively vulnerable to cyber attack, much like the presence of unimmunized portions of the population do in a public health sense,” said Peisert. “On the other hand, if properly leveraged, our community may help us figure out how to protect our organizations, so our goal is to understand the challenges created by this community as well as to explore possible solutions.”&lt;/p&gt;</description>
    </item>
    <item>
      <title>CENIC&#39;s Community Approach for Bringing Increased Security to Its Network and Constituent Institutions</title>
      <link>https://peisert.net/blog/2017/05/05/cenic-increased-security/</link>
      <pubDate>Fri, 05 May 2017 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2017/05/05/cenic-increased-security/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Numerous recent headlines have drawn our attention to successful hacking, with breaches of information believed to be secure and systems believed to be safe. In the last year, hospitals have paid ransom to regain access to their own records, and political parties have been publicly embarrassed. Headlines like these raise security concerns for any organization.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;At the center of CENIC’s work is its commitment to supporting the research, education, and government missions of its members in an open and transparent way.  The 20 million people who rely on CENIC’s network to connect with each other and the world want to know that their network is reliable.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CENIC&#39;s Network Security Initiative</title>
      <link>https://peisert.net/blog/2017/03/cenic-network-security-initiative/</link>
      <pubDate>Wed, 15 Mar 2017 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2017/03/cenic-network-security-initiative/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The 20 million people who rely on CENIC&amp;rsquo;s network to connect with each other and with the world want to know that their network is secure, safe, and reliable. As part of developing a more robust security strategy, CENIC has produced a comprehensive, risk-prioritized list of computing and networking assets, and has begun a detailed examination of security posture and risk exposure for the most critical assets. Mitigations, including monitoring and hardening, have also begun.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Mind the gap: Speaking like a cybersecurity pro</title>
      <link>https://peisert.net/blog/2017/02/mind-the-gap/</link>
      <pubDate>Fri, 10 Feb 2017 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2017/02/mind-the-gap/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The Open Science Cyber Risk Profile is a bridge between the language of the domain scientist and the language of the information security professional.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&amp;hellip;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;To bridge this linguistic divide, funding from National Science Foundation (NSF) and the Department of Energy (DOE) has launched the Open Science Cyber Risk Profile (OSCRP).&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://sciencenode.org/feature/mind-the-gap-how-to-speak-like-an-information-security-pro.php&#34;&gt;More at ScienceNode&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Building a CENIC Security Strategy</title>
      <link>https://peisert.net/blog/2017/01/building-a-cenic-security-strategy/</link>
      <pubDate>Wed, 11 Jan 2017 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2017/01/building-a-cenic-security-strategy/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Numerous headlines in recent years have drawn our attention to successful hacking, leading to breaches of information believed secure, access to systems believed safe. This year alone, hospitals have paid ransom to regain access to their own records, and political parties have been publicly embarrassed, to the point of replacing their own leaders.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Those headlines raise security questions for any organization involved in the digital economy, and CENIC is no different.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Working Group on Open Science Cybersecurity Risks Releases First Document Draft for Public Comment</title>
      <link>https://peisert.net/blog/2016/10/open-science-cybersecurity-risk-profile-public-comment/</link>
      <pubDate>Mon, 31 Oct 2016 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2016/10/open-science-cybersecurity-risk-profile-public-comment/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Over the past several months, ESnet and the NSF Cybersecurity Center of Excellence collaborated with research and education community leaders to develop a risk profile for open science to formally capture and benchmark this expertise, allowing other organizations to apply these best practices more broadly.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Today, the group is releasing its draft Open Science Cyber Risk Profile (OSCRP) and inviting comment from the research community. The OSCRP is designed to help principal investigators and their supporting information technology professionals assess cybersecurity risks related to open science projects. The draft document, along with information on how to comment, can be found at &lt;a href=&#34;http://trustedci.github.io/OSCRP/&#34;&gt;http://trustedci.github.io/OSCRP/&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Value of Failed Experiments in Cybersecurity</title>
      <link>https://peisert.net/blog/2016/09/value-of-failed-cybersecurity-experiments/</link>
      <pubDate>Thu, 08 Sep 2016 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2016/09/value-of-failed-cybersecurity-experiments/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The “Learning from Authoritative Security Experiment Results (LASER)” workshop series was established in 2012 with the purpose of publishing results for “properly conducted experimental (cyber) security research, including both successful as well as unsuccessful experiments.” Here, 2016 program chair Sean Peisert, a staff scientist at Lawrence Berkeley National Laboratory, associate adjunct professor of computer science at the University of California, Davis, and chief scientist for cybersecurity for the Corporation for Education Network Initiatives in California, discusses the importance of failed experiments and evidence-based approaches in cybersecurity.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Detecting Cybersecurity Threats by Taking the Grid&#39;s Pulse</title>
      <link>https://peisert.net/blog/2016/07/detecting-cybersecurity-threats/</link>
      <pubDate>Fri, 22 Jul 2016 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2016/07/detecting-cybersecurity-threats/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;a research effort, led by LBNL cybersecurity expert Sean Peisert, to optimize the integration of micro-PMUs within cybersecurity systems for distribution grids. At least two utilities are collaborating.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&lt;a href=&#34;http://spectrum.ieee.org/energy/the-smarter-grid/sniffing-out-grid-attacks&#34;&gt;Read more at IEEE Spectrum&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>NSF Cybersecurity Center of Excellence, ESnet Organize Working Group on Open Science Threats</title>
      <link>https://peisert.net/blog/2016/06/working-group-on-open-science-threats/</link>
      <pubDate>Fri, 22 Jul 2016 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2016/06/working-group-on-open-science-threats/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Managing the security risks to scientific instruments, data and cyberinfrastructure is a priority for creating a trustworthy environment for science. Assessing and managing the risks to the integrity and availability of science, and sometimes also privacy issues, involves making judgments on the likelihood and consequences of threats. Deep experience in understanding cybersecurity and the science being supported is needed to achieve these goals. As a result, ESnet and the NSF Cybersecurity Center of Excellence are collaborating with research and education community leaders to develop a threat profile for open science to formally capture and benchmark this expertise, allowing other organizations to apply these best practices more broadly.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Livermore, Berkeley National Labs Leading Project to Increase Power Grid Cybersecurity</title>
      <link>https://peisert.net/blog/2016/07/livermore-berkeley-project-power-grid-cybersecurity/</link>
      <pubDate>Tue, 12 Jul 2016 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2016/07/livermore-berkeley-project-power-grid-cybersecurity/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Cybersecurity experts Jamie Van Randwyk of Lawrence Livermore National Laboratory (LLNL) and Sean Peisert of Lawrence Berkeley National Laboratory (Berkeley Lab) are leading a new program to develop new data analysis methods to better protect the nation’s power grid.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;The project, “Threat Detection and Response with Data Analytics,” is part of a $220 million, three-year Grid Modernization Initiative launched in January 2016 by the Department of Energy to support research and development in power grid modernization.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Science Cyber Risk Profile (OSCRP)</title>
      <link>https://peisert.net/blog/2016/04/open-science-cyber-risk-profile/</link>
      <pubDate>Fri, 01 Apr 2016 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2016/04/open-science-cyber-risk-profile/</guid>
      <description>&lt;p&gt;I am co-leading the [Center for Trustworthy Scientific Cyberinfrastructure (CTSC) &lt;a href=&#34;http://trustedci.github.io/OSCRP/&#34;&gt;Open Science Cyber Risk Profile (OSCRP)&lt;/a&gt; effort along with &lt;a href=&#34;https://www.es.net/about/esnet-staff/cybersecurity/michael-dopheide/&#34;&gt;Michael Dopheide&lt;/a&gt; of &lt;a href=&#34;http://www.es.net&#34;&gt;ESnet&lt;/a&gt; and &lt;a href=&#34;http://www.vonwelch.com&#34;&gt;Von Welch&lt;/a&gt; and &lt;a href=&#34;https://cacr.iu.edu/about/People/staff/susan-sons.php&#34;&gt;Susan Sons&lt;/a&gt; of IU&amp;rsquo;s &lt;a href=&#34;http://trustedci.org&#34;&gt;Trusted CI&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Chief Cybersecurity Strategist for CENIC</title>
      <link>https://peisert.net/blog/2016/01/cenic-chief-cybersecurity-strategist/</link>
      <pubDate>Tue, 19 Jan 2016 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2016/01/cenic-chief-cybersecurity-strategist/</guid>
      <description>&lt;p&gt;I am Chief Cybersecurity Strategist for &lt;a href=&#34;http://cenic.org&#34;&gt;CENIC&lt;/a&gt; and Director of the &lt;a href=&#34;https://web.archive.org/web/20170710072818/http://cenic.org/news/item/cenic-and-esnet-announce-joint-cybersecurity-initiative&#34;&gt;CENIC/ESnet Joint Cybersecurity Initiative&lt;/a&gt;).&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.es.net/news-and-publications/esnet-news/2016/esnet-cenic-announce-joint-cybersecurity-initiative/&#34;&gt;Read more at es.net&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>ESnet, CENIC Announce Joint Cybersecurity Initiative -- Berkeley Lab’s Sean Peisert to serve as director of initiative</title>
      <link>https://peisert.net/blog/2016/01/esnet-cenic-joint-cybersecurity-initiative-peisert/</link>
      <pubDate>Tue, 19 Jan 2016 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2016/01/esnet-cenic-joint-cybersecurity-initiative-peisert/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The Department of Energy’s Energy Sciences Network, or ESnet, and the Corporation for Education Network Initiatives in California (CENIC) have announced an initiative to jointly develop cybersecurity strategies and research projects.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Sean Peisert of Lawrence Berkeley National Laboratory’s (Berkeley Lab) Computational Research Division will be director of the new CENIC/ESnet Joint Cybersecurity Initiative. Peisert, who was also recently named as the chief cybersecurity strategist for CENIC, is a noted security expert who has worked extensively in computer security research and development. He will continue his work at Berkeley Lab and as an adjunct faculty member of the University of California at Davis.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CENIC and ESnet Announce Joint Cybersecurity Initiative</title>
      <link>https://peisert.net/blog/2016/01/cenic-esnet-joint-cybersecurity-initiative/</link>
      <pubDate>Tue, 12 Jan 2016 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2016/01/cenic-esnet-joint-cybersecurity-initiative/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The Corporation for Education Network Initiatives in California (CENIC) and the Energy Sciences Network (ESnet) are pleased to announce a partnership between their organizations in the area of cybersecurity.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;“CENIC is a critical partner of ESnet’s, and we already collaborate actively to improve research outcomes in California and beyond,” said ESnet Director Greg Bell. “This new initiative is timely and exciting. Because data exchange is the lifeblood of open science, both organizations require innovative and flexible cybersecurity solutions in order to succeed. Aligning our strategies and teams is an important step forward.”&lt;/p&gt;</description>
    </item>
    <item>
      <title>Vice Chair of IEEE Technical Committee on Security &amp;amp; Privacy</title>
      <link>https://peisert.net/blog/2016/01/ieee-technical-committee-security-privacy/</link>
      <pubDate>Fri, 01 Jan 2016 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2016/01/ieee-technical-committee-security-privacy/</guid>
      <description>&lt;p&gt;I am the vice chair of the &lt;a href=&#34;http://ieee-security.org&#34;&gt;IEEE Technical Committee on Security &amp;amp; Privacy&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Chair of ASCR Cybersecurity Workshops and Editor of Workshop Reports</title>
      <link>https://peisert.net/blog/2015/06/cybersecurity-scientific-computing/</link>
      <pubDate>Mon, 01 Jun 2015 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2015/06/cybersecurity-scientific-computing/</guid>
      <description>&lt;p&gt;I chaired the &lt;a href=&#34;http://www.orau.gov/cybersecurity2015/&#34;&gt;DOE ASCR Cybersecurity Workshop&lt;/a&gt; in early 2015 and edited the subsequent &lt;a href=&#34;http://science.energy.gov/~/media/ascr/pdf/programdocuments/docs/ASCR_Cybersecurity_For_Scientific_Computing_Integrity_Report_2015.pdf&#34;&gt;report&lt;/a&gt;, and chaired the &lt;a href=&#34;https://www.orau.gov/integrity2015/&#34;&gt;DOE ASCR Cybersecurity for Scientific Computing Integrity Workshop&lt;/a&gt; in June 2015 and also edited the subsequent &lt;a href=&#34;http://science.energy.gov/~/media/ascr/pdf/programdocuments/docs/ASCR_Cybersecurity_20_Research_Pathways_and_Ideas_Workshop.pdf&#34;&gt;report&lt;/a&gt; for that workshop.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NSF funds NetSage to analyze, improve international data networks</title>
      <link>https://peisert.net/blog/2015/05/nsf-netsage-international-networks/</link>
      <pubDate>Tue, 12 May 2015 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2015/05/nsf-netsage-international-networks/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Every day, thousands of researchers rely on robust data networks to share petabytes of data with their colleagues around the world. A new $5 million, five-year National Science Foundation grant, awarded to Indiana University, the University of California, Davis and the University of Hawaii at Mānoa, seeks to bolster these networks by enabling unprecedented measurement and analysis.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;The grant will fund NetSage, a network measurement, analysis and visualization service designed to address the needs of today’s international networks. The principal investigators are: Jennifer Schopf at Indiana University; Sean Peisert, assistant professor of computer science at UC Davis; and Jason Leigh at the University of Hawaii.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Peisert Compiles Workshop Report on Securing Scientific Computing Integrity</title>
      <link>https://peisert.net/blog/2015/03/workshop-report-scientific-computing-integrity/</link>
      <pubDate>Fri, 20 Mar 2015 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2015/03/workshop-report-scientific-computing-integrity/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Sean Peisert of CRD’s Integrated Data Frameworks Group has published a report from a DOE workshop on ASCR Cybersecurity for Scientific Computing Integrity. Peisert co-chaired the workshop held Jan. 7-9 in Rockville, Md. CRD Director David Brown and ESnet’s Brian Tierney were members of the workshop organizing committee. Eric Roman of CRD and Scott Campbell of NERSC participated in the workshop.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&lt;a href=&#34;http://crd.lbl.gov/news-and-publications/news/2015/peisert-compiles-workshop-report-on-securing-scientific-computing-integrity/&#34;&gt;Read more at lbl.gov&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Securing Scientific Computing Integrity</title>
      <link>https://peisert.net/blog/2015/03/securing-scientific-computing-integrity/</link>
      <pubDate>Fri, 20 Mar 2015 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2015/03/securing-scientific-computing-integrity/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Sean Peisert of CRD’s Integrated Data Frameworks Group has published a report from a DOE workshop on ASCR Cybersecurity for Scientific Computing Integrity. Peisert co-chaired the workshop held Jan. 7-9 in Rockville, Md. CRD Director David Brown and ESnet’s Brian Tierney were members of the workshop organizing committee. Eric Roman of CRD and Scott Campbell of NERSC participated in the workshop.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&lt;a href=&#34;http://cs.lbl.gov/news-media/news/2015/securing-scientific-computing-integrity/&#34;&gt;Read more at lbl.gov&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>CRD&#39;s Sean Peisert Guest Edits Special Issue of IEEE&#39;s Security and Privacy Magazine</title>
      <link>https://peisert.net/blog/2015/01/guest-edit-ieee-security-privacy-magazine/</link>
      <pubDate>Tue, 20 Jan 2015 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2015/01/guest-edit-ieee-security-privacy-magazine/</guid>
      <description>&lt;p&gt;CRD&amp;rsquo;s Sean Peisert recently guest edited a special issue of IEEE Security &amp;amp; Privacy Magazine (&lt;a href=&#34;http://www.computer.org/security&#34;&gt;http://www.computer.org/security&lt;/a&gt;), of which he is also a member of the editorial board. The special issue focuses on &amp;ldquo;Control Systems Security for the Energy Sector&amp;rdquo; and contains six-peer reviewed articles with authors from U.S. national labs, U.S. and international academic institutions, and industry.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open-Source Software Won&#39;t Ensure Election Security</title>
      <link>https://peisert.net/blog/2017/08/24/open-source-software-wont-ensure-election-security/</link>
      <pubDate>Thu, 01 Jan 2015 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2017/08/24/open-source-software-wont-ensure-election-security/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;The technology behind elections is hard to get right. Elections require security. They also require transparency: anyone should be able to observe enough of the election process, from distribution of ballots, to the counting and canvassing of votes, to verify that the reported winners really won. But if people vote on computers or votes are tallied by computers, key steps of the election are not transparent and additional measures are needed to confirm the results.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CRD’s Sean Peisert Shares Cyber Security Expertise at I3P Meeting</title>
      <link>https://peisert.net/blog/2012/10/i3p-10th-anniversary/</link>
      <pubDate>Fri, 26 Oct 2012 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2012/10/i3p-10th-anniversary/</guid>
      <description>&lt;p&gt;Sean Peisert, a research scientist in Berkeley Lab&amp;rsquo;s Computational Research Division, recently gave a presentation talk at the 10th Anniversary of the Institute for Information Infrastructure Protection (I3P), held Oct. 10 at the National Press Club in Washington, D.C. Peisert discussed the impact of I3P, a consortium of leading universities, national laboratories and nonprofit institutions dedicated to strengthening the cyber infrastructure of the United States.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;http://crd.lbl.gov/news-and-publications/news/2012/crd-s-sean-peisert-shares-cyber-security-expertise-at-i3p-meeting/%3E&#34;&gt;Read more at lbl.gov&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Resolving the Unexpected in Elections: Election Officials&#39; Options</title>
      <link>https://peisert.net/blog/2008/10/08/resolving-the-unexpected-in-elections/</link>
      <pubDate>Wed, 08 Oct 2008 00:00:00 +0000</pubDate><author>spp@peisert.net (Sean Peisert, Ph.D.)</author>
      <guid>https://peisert.net/blog/2008/10/08/resolving-the-unexpected-in-elections/</guid>
      <description>&lt;p&gt;This paper seeks to assist election officials and their lawyers in effectively handling the technical issues that can be difficult to understand and analyze, allowing them to protect themselves and the public interest from unfair accusations, inaccuracies in results, and conspiracy theories. The paper helps to empower officials to recognize which types of voting system events and indicators need a more structured analysis and what steps to take to set up the evaluations (or forensic assessments) using computer experts.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
