{"nodes":[{"node":{"nid":"104003","title":"ASU cybercrime-fighter helps us compute with confidence: Q\u0026A with Adam Doup\u00e9","body":"Adam Doup\u00e9 has always been interested in how computers work. When he was in high school, he read an online post about how to spoof email addresses and sent an email to his friends from santa@northpole.com. He said he was blown away by the fact that if you just understand how the technology works,\u2026","post_date":"\u003Ctime datetime=\u00222025-01-14T10:01:32-07:00\u0022\u003E01\/14\/2025-10:01am\u003C\/time\u003E\n","clas_teaser":"Doup\u00e9 reflects on 10 years of GSI, CTF\u0026#039;s cybersecurity workforce efforts and their quest to create secure and trusted technology for all users. \u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n","teaser":"Adam Doup\u00e9 has always been interested in how computers work. When he was in high school, he read an online post about how to spoof email addresses and sent an email to his friends from santa@northpole.com.","story_images":"","hero_image":"https:\/\/news.asu.edu\/sites\/default\/files\/styles\/block_image_16_9_lge\/public\/2025-01\/AdamDoupe.jpg?itok=Jj9IHRci","path":"https:\/\/news.asu.edu\/b\/20250114-asu-cybercrimefighter-helps-us-compute-confidence-qa-adam-doupe","hide_byline":"0","contributor-contact-information-affiliation":"Knowledge Enterprise","contributor-contact-information-name":"Alicia Barr\u00f3n","contributor-contact-information-e-mail":"{{ mail }}","contributor-contact-information-phone_number":"","contributor-contact-information-campus":"Tempe campus","feed_image_link":"","image_url":"https:\/\/news.asu.edu\/sites\/default\/files\/styles\/block_image_16_9_lge\/public\/2025-01\/AdamDoupe.jpg?itok=Jj9IHRci","image_alt":"Director of Center for Cybersecurity and Trusted Foundations Adam Doup\u00e9 leaning on a railing with digital circuit designs in the background.","image_caption":"Photo illustration by Christian Van Bebber","related_story":"","news_units":"Center for Cybersecurity and Digital Forensics|Center for Cybersecurity and Trusted Foundations|School of Computing and Augmented Intelligence|Advanced Capabilities for National Security Institute|Ira A. Fulton Schools of Engineering|Knowledge Enterprise","interests":"","audiences":"","locations":"Tempe campus","u_n_sustainable_development_goals":"","field_feed_herberger":"","field_feed_nursing":"","field_feed_knowledge_enterprise":"Artificial Intelligence|Cybersecurity|Department of Defense|Disinformation|National Security|STEM Education","content_type":"feed_only_article","field_saf":""}},{"node":{"nid":"90395","title":"Addressing software bugs","body":"From the recent Facebook data breach of over 500 million accounts, to stories of hackers getting into family homes through baby monitors, we are constantly bombarded by headlines of hackers taking advantage of security vulnerabilities in the software we use every day.The truth is, humans create\u2026","post_date":"\u003Ctime datetime=\u00222021-09-27T14:45:00-07:00\u0022\u003E09\/27\/2021-2:45pm\u003C\/time\u003E\n","clas_teaser":"ASU is tackling the problem of fixing software vulnerabilities through micropatching. We talked to Adam Doup\u00e9, director of the Center for Cybersecurity and Digital Forensics, about the importance of this research and the impact it provides.","teaser":"From the recent Facebook data breach of over 500 million accounts, to stories of hackers getting into family homes through baby monitors, we are constantly bombarded by headlines of hackers taking advantage of security vulnerabilities in the softw","story_images":"","hero_image":"https:\/\/news.asu.edu\/sites\/default\/files\/styles\/block_image_16_9_lge\/public\/custom_1s_and_0s_software_coding_graphic_for_amp_story.jpg?itok=bTKq-oIj","path":"https:\/\/news.asu.edu\/20210927-addressing-software-bugs-asu-software-vulnerabilities-micropatching","hide_byline":"0","contributor-contact-information-affiliation":"Global Security Initiative","contributor-contact-information-name":"Oliver Dean","contributor-contact-information-e-mail":"{{ mail }}","contributor-contact-information-phone_number":"480-727-4419","contributor-contact-information-campus":"Tempe campus","feed_image_link":"","image_url":"https:\/\/news.asu.edu\/sites\/default\/files\/styles\/block_image_16_9_lge\/public\/custom_1s_and_0s_software_coding_graphic_for_amp_story.jpg?itok=bTKq-oIj","image_alt":"Computer software coding","image_caption":"","related_story":"","news_units":"Center for Cybersecurity and Digital Forensics|School of Computing and Augmented Intelligence|Advanced Capabilities for National Security Institute|Ira A. Fulton Schools of Engineering","interests":"Innovation|National security|Education|Engineering|Technology|Academics|Cybersecurity","audiences":"Faculty|Community","locations":"Tempe campus","u_n_sustainable_development_goals":"","field_feed_herberger":"","field_feed_nursing":"","field_feed_knowledge_enterprise":"","content_type":"asu_news_article","field_saf":"Science and technology"}}]}