The History of Cybersecurity 2019 Calendar

As security practitioners and history buffs, we’re intrigued by the history of cybersecurity. So much so, we built a calendar around it this year. Each month of the History of Cybersecurity 2019 Calendar features a significant date in cybersecurity history, along with a related trivia question and other notable dates in that month.

Speaking of trivia, test your own knowledge of cybersecurity history. See if you can answer the questions below—then learn more about these historical cybersecurity events on our blog.

If you think we missed an important date in the calendar (or got something wrong – we hope not!), let us know. Share your feedback with us on Twitter! And if the calendar has you inspired to get on OUR calendar, request a demo. We’ll show you how Exabeam’s SIEM can help your organization identify many of the threats featured in the calendar.

May 2019 Trivia

Q: What algorithm did the Advanced Encryption Standard (AES) replace?
Show Answer
A. AES replaced the Data Encryption Standard (DES), a cipher developed by IBM in 1973. Triple DES - encryption with DES three times - was used for some time, but that, too, was considered inadequate and in need of replacement by 1997. Learn More

April 2019 Trivia

Q: What is the name of the encryption algorithm intended to be used on the Clipper chip?
Show Answer
A. Skipjack Learn More

March 2019 Trivia

Q: Who wrote Creeper and why?
Show Answer
A. Bob Thomas, a developer at BBN Technologies, is the author of Creeper. His goal was not to infect machines, but to demonstrate that an application could move from one machine to another. A distributed computing experiment that opened a Pandora’s box. Learn More

February 2019 Trivia

Q: Who is considered the “father of SSL”?
Show Answer
A. Taher Elgamal, cryptographer and chief scientist at Netscape Communications, is considered to be the driving force behind the protocol, although other Netscape engineers were also involved. Learn More

January 2019 Trivia

Q: What is the name of the group responsible for Operation Aurora?
Show Answer
A. The Elderwood Gang -- aka the Elderwood Group -- a Chinese cyber espionage group suspected to have ties to the People’s Liberation Army. Learn More