Share This Profile
Share this profile on Facebook.
Link to this profile on LinkedIn.
Tweet this profile on Twitter.
Email a link to this profile.
See other services through which you can share this profile.
This profile was last updated on 1/23/15  and contains information from public web pages and contributions from the ZoomInfo community.

Dr. Thomas A. Longstaff

Wrong Dr. Thomas A. Longstaff?

Principal Cybersecurity Strategis...

11100 Johns Hopkins Road
Laurel , Maryland 20723
United States


Employment History


  • B.A. , Physics and Mathematics
    Boston University
  • Ph.D. , software environments
    University of California , Davis
  • M.S. , Physics and Mathematics
    University of California , Davis
80 Total References
Web References
CERT's Podcast Series: Speaker Biographies, 28 July 2011 [cached]
Jeff Gennari | Julia Allen | David White | Ron Ross | Jim Cebula | Brett Lambo | Matt Butkovic | Michael Hanley | Tom Longstaff | Julia Allen | Tom LongstaffTom Longstaff | Julia AllenJulia Allen
Jeff Gennari | Julia Allen | David White | Ron Ross | Jim Cebula | Brett Lambo | Matt Butkovic | Michael Hanley | Tom Longstaff | Julia Allen | Tom LongstaffTom Longstaff | Julia AllenJulia Allen
Tom Longstaff
Thomas Longstaff is the Deputy Director for Technology in the CERT Program at the Software Engineering Institute (SEI). Longstaff has spent the past 12 years managing and initiating many of the CERT/CC's projects and initiatives such as the CERT Analysis Center, CERT Research Center, many survivability projects, and most recently Network Situational Awareness. His current scope of work includes evaluating technology across the entire CERT Program to assure continued quality and innovation of all the work at CERT. Longstaff is responsible for strategic planning for the program, technology scouting for promising avenues to address security problems, and operating as a point of contact between research projects at Carnegie Mellon University and CERT.
Prior to coming to the Software Engineering Institute, Longstaff was the technical director at the Computer Incident Advisory Capability (CIAC) at Lawrence Livermore National Laboratory in Livermore, California. Longstaff obtained his M.S. in 1986 and Ph.D. from the University of California, Davis in 1992 in software environments, and his B.A. from Boston University in 1983 in Physics and Mathematics.
Longstaff's publications span topics such as security policy, information survivability, insider threat, intruder modeling, and intrusion detection. His awards include Best Paper in 1995 at the NCSC Conference and the Carnegie Mellon University Andy Award for Outstanding Innovation in 2000.
CERT's Podcast Series: Notes - Evolving Business Models, Threats, and Technologies, 28 July 2011 [cached]
In this podcast, Tom Longstaff, CERT's Deputy Director for Technology, discusses how business models are evolving and the implications for security threats and technology solutions.
The Future of Security - In 2010, information security will be much better than it is today. But between then and now, everything will get inconceivably worse. - CIO Magazine Dec 15,2003 [cached]
"By 2010, there will be a growing general awareness, a link between what individual users do and how that affects the national interest," says Tom Longstaff, the manager of the CERT Analysis Center, which takes in data on the Internet's swelling number of vulnerabilities and security incidents."I think of World War II," he adds, "and rationing rubber and nylon.After a momentous event, there's often a subjugation of the tragedy of the commons."
A security reformation will not take place overnight.Longstaff believes that even with a digital Pearl Harbor in 2008, we'll be only 20 percent reformed by 2010.
Mr. Pasciullo was the keynote speaker ... [cached]
Mr. Pasciullo was the keynote speaker at the Property Loss Research Bureau's 1999 Claims Conference dedicated to Y2K issues along with his long-time collaborator, Dr. Thomas Longstaff, Chief Scientist, The Johns Hopkins University Applied Physics Laboratory and Chair, Computer Science, Information Assurance and Information Systems Engineering Programs at Johns Hopkins University.
"From Here to 2001, Not Quite Eternity," with Dr. Thomas Longstaff, Assistant Director, CERT, joint publication with the Software Engineering Institute, Carnegie Mellon University, March 1999
"It's possible to detect the attack, ..., 30 July 2012 [cached]
"It's possible to detect the attack, but it is very hard to block it" using current software, said Thomas Longstaff, senior technical researcher for Software Engineering Institute at Carnegie Mellon University, during a panel presentation Tuesday. A garden-variety denial-of-service attack uses a single server to attempt to tie up a network's connection, denying its users access to or from the Internet. Distributed coordinated attacks, however, use hundreds or thousands of servers co-opted by a malicious programmer to tag-team a single server. Because so many servers are used, each attack can be camouflaged as a legitimate connection attempt, making it difficult for the victim's intrusion software to identify that it is under attack and impossible to identify just who is attacking. "Typically, you block the single network address that is attacking you," said Longstaff, whose group works with the Computer Emergency Response Team Coordination Center at Carnegie Mellon. CERT/CC tracks and responds to network attacks. "By spreading out the attack over a large number of addresses, it becomes much harder to deal with. A 'handful' of attacks Longstaff and others have already locked horns with intruders using the distributed coordinated method of attack. In the past six weeks, a "handful of sites" have been attacked, taking them off the Internet for an unspecified amount of time, he said. He would not give any more details.
Other People with the name "Longstaff":
Other ZoomInfo Searches
Accelerate your business with the industry's most comprehensive profiles on business people and companies.
Find business contacts by city, industry and title. Our B2B directory has just-verified and in-depth profiles, plus the market's top tools for searching, targeting and tracking.
Atlanta | Boston | Chicago | Houston | Los Angeles | New York
Browse ZoomInfo's business people directory. Our professional profiles include verified contact information, biography, work history, affiliations and more.
Browse ZoomInfo's company directory. Our company profiles include corporate background information, detailed descriptions, and links to comprehensive employee profiles with verified contact information.