Stephen Cox

Stephen Cox

Leesburg, Virginia, United States
2K followers 500+ connections

Activity

Join now to see all activity

Experience

  • Strivacity Graphic

    Strivacity

    Herndon, Virginia

  • -

  • -

  • -

    Reston, Virginia

  • -

    Irvine, California

  • -

    Reston, Virginia

  • -

  • -

    Sterling, Virginia

  • -

    Chantilly, Virginia

  • -

    Dulles, Virginia

Publications

  • The ethics of vendor inaction and vulnerability disclosure

    ITProPortal

    Vendor inaction is most definitely an ethical pressure and is central to this ongoing discussion: it is one of the reasons the concept of responsible disclosure exists. A security researcher has a moral responsibility to inform the public of a vulnerability if the vendor chooses to ignore a disclosure through incompetence or sheer will. In theory, this makes logical and moral sense. In practice, these guidelines have rough edges even after two decades of disclosing bugs.

    See publication
  • A necessary oath: maintaining ethics in today's cyber world

    SC Magazine UK

    Given the far-reaching implications of their work, it's time for cyber-security professionals to consider creating an oath to uphold ethical standards, says Stephen Cox.

    See publication
  • Defending Against Advanced Threats at the Identity Perimeter

    SecureAuth Corporation

    The edge of your network is increasingly difficult to define, as identities may carry it outside of traditional data center boundaries. This has made identity a perimeter of its own. In this white paper you will learn why identity is the perimeter you should care about most, how to protect it and how you can use identity alerts to proactively detect advance threats.

Patents

  • Identity security and containment based on detected threat events

    Issued US 9769209

    An alert source issues security alerts to an identity provider, which acts as a gatekeeper to a secure resource. Each security alert is associated with an alert user identity and a security threat. When a user identity requests access to the secure resource, the identity provider may look up security alerts associated with the user identity, such as my matching up the user identity with the alert user identity associated with each alert. Based on any discovered security alerts that correspond…

    An alert source issues security alerts to an identity provider, which acts as a gatekeeper to a secure resource. Each security alert is associated with an alert user identity and a security threat. When a user identity requests access to the secure resource, the identity provider may look up security alerts associated with the user identity, such as my matching up the user identity with the alert user identity associated with each alert. Based on any discovered security alerts that correspond to the user identity and a pre-defined security policy, the identity provider may perform various security actions on the user identity. For example, the identity provider may contain a user identity associated with high-risk and/or high fidelity security alerts. The identity provider may deny the user identity access to the secure resource, or the identity provider may request additional authentication factors associated with the user identity before access to the secure resource is provided.

    See patent

Languages

  • English

    -

More activity by Stephen

View Stephen’s full profile

  • See who you know in common
  • Get introduced
  • Contact Stephen directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Stephen Cox in United States