Steven Bellovin

Steven Bellovin

Professor of Computer Science at Columbia University
Joined on December 2, 2008
Total Post Views: 921,225

About

Steven M. Bellovin is a professor of computer science at Columbia University, where he does research on networks, security, and especially why the two don’t get along. He joined the faculty in 2005 after many years at Bell Labs and AT&T Labs Research, where he was an AT&T Fellow. He received a BA degree from Columbia University, and an MS and PhD in Computer Science from the University of North Carolina at Chapel Hill. While a graduate student, he helped create Netnews; for this, he and the other perpetrators were given the 1995 Usenix Lifetime Achievement Award. He is a member of the National Academy of Engineering and is serving on the Department of Homeland Security’s Science and Technology Advisory Board; he has also received the 2007 NIST/NSA National Computer Systems Security Award.

Bellovin is the co-author of Firewalls and Internet Security: Repelling the Wily Hacker, and holds several patents on cryptographic and network protocols. He has served on many National Research Council study committees, including those on information systems trustworthiness, the privacy implications of authentication technologies, and cybersecurity research needs; he was also a member of the information technology subcommittee of an NRC study group on science versus terrorism. He was a member of the Internet Architecture Board from 1996-2002; he was co-director of the Security Area of the IETF from 2002 through 2004.

Except where otherwise noted, all postings by Steven Bellovin on CircleID are licensed under a Creative Commons License.

Comments

Topic Interests

PrivacyCybersecurityPolicy & RegulationInternet GovernanceCybercrimeThreat IntelligenceCyberattackMalwareNetworksLawNew TLDsDomain NamesDomain ManagementRegistry ServicesWebIPv6 Transition IPv4 MarketsAccess ProvidersDNS SecurityICANNVoIPDNSP2PDDoS AttackBrand ProtectionCensorshipMobile InternetWirelessEmailBroadbandNet NeutralityCloud ComputingBlockchainInternet ProtocolCoronavirusData Center

Recent Blogs

The Importance of Understanding Attacker Target Selection

Where Did “Data Shadow” Come From?

An Inquiry Into an Organization’s Security Priorities

Hot Take on the Twitter Hack

Trust Binding

Popular Posts

The Cybersecurity Act of 2009

The Sins of the Flash

Preliminary Thoughts on the Equifax Hack

Skype’s End User License Agreement

Two More Crypto Holes