Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

DARPA Loses Security Muscle to Google

Peiter Zatko, better known to the InfoSec world as “Mudge”, earning his reputation as a member of L0pht and the Cult of the Dead Cow, announced last Friday that he is leaving DARPA in order to take a position at Google.

Peiter Zatko, better known to the InfoSec world as “Mudge”, earning his reputation as a member of L0pht and the Cult of the Dead Cow, announced last Friday that he is leaving DARPA in order to take a position at Google.

The announcement was made on Twitter, where the hacking icon Tweeted, “Given all we pulled off within the [U.S. Government], let’s see if it can be done even better from outside. Goodbye DARPA, hello Google!”

Zatko didn’t get into specifics as to what his job will be when he starts working for the software and search giant. When asked by SecurityWeek’s Managing Editor about his title, he said via Twitter: “Whether coming in as a CVP or as a tech director, the title isn’t important. What you do when you are there defines the value. In other words, I don’t know. :)”

Zatko has worked in and around the InfoSec world since the mid-90’s, and was one of only a few hackers to have even spoken to lawmakers in a semi-official capacity, representing an entire community, culture, and for some – a way of life. He is credited with early research into buffer overflow vulnerabilities, and alongside his L0pht partners, gained widespread media attention after telling Congress that it would take about 30 minutes to take the entire Internet down. (A point that many still say is true to this day.)

L0pht went legit in 1999, and joined forces with @Stake, which was snapped-up by Symantec in 2004. After that, Zatko is said to have worked with BBN Technologies before finally moving to DARPA to become a project manager. At DARPA, he created a fast track program that helped hackers working outside of the government get funding for creative ideas and innovations that could be used to secure Defense Department systems.

While his role at Google remains unknown, it’s clear that the government has lost a valuable asset. One can only hope that Google doesn’t waste such a resource.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem