Blogroll
Spectre and Meltdown Attacks
Tamper-Detection App for Android
Fake Santa Surveillance Camera
Security Vulnerabilities in Star Wars
Friday Squid Blogging: Squid Populations Are Exploding
Profile of Reality Winner
The "Extended Random" Feature in the BSAFE Crypto Library
Post-Quantum Algorithms
Acoustical Attacks against Hard Drives
Daniel B. Cid, Sucuri
Daniel Cid from Sucuri has agreed to a thought leadership interview. We hope that you will enjoy his thoughts and impressions and we certainly thank him for his time.
Dominique Karg, AlienVault
Dominique Karg from AlienVault has agreed to a thought leadership interview. We hope that you will enjoy his thoughts and impressions and we certainly thank him for his time.
Lance Spitzner, Securing The Human, founder
Lance Spitzner of Honeynet and Security The Human fame has agreed to a Thought Leadership interview and we certainly thank him for his time.
Bill Pfeifer, Juniper Networks
Bill Pfeifer is a Product Line Engineer
at Juniper Networks supporting security software and data center
firewalls. He has been in the IT field for 15 years, including stints at
an Army tank base, a
technology reseller, and some time at a financial services ASP. He holds
a Bachelors degree in Civil Engineering from Penn State and an MBA
with a human resources focus from Oakland University.
Chris Pogue, Senior Security Analyst
Chris Pogue is a Senior Security Analyst for the Spiderlabs Incident Response and Digital Forensics team at Trustwave. He has over ten years of administrative and security experience including three years on the IBM ISS X-Force Emergency Response Services Team, five years with IBMs Ethical Hacking Team, and 13 years of Active Military service in the US Army Signal Corps.
John Kanen Flowers
John is a truly unique security thought leader. He has been involved in a number of start ups and is currently working on something fairly radical カネ|box (or kane|box).
Kees Leune, Leune Consultancy, LLC
Kees has made many contributions to the information assurance community, but one, the use of rubrics to help guide the peer review of GIAC Gold papers means a lot to me. It means a lot to you as well, because it created a state change for higher quality in the Gold program. So those of us at the Security Laboratory are excited that he has chosen to be a part of the SecurityThought Leadership Project.
Joel Yonts, CISO
Joel Yonts is a seasoned security executive with a passion for
information security research.He has over 20 years of IT
experience with certifications in the areas of Security Leadership,
Computer Forensics, Malware Analysis, Incident Handling, and Reverse
Engineering. His research interests include malware analysis and
defense, computer forensics, and enterprise security.
Maury Shenk, TMT Advisor, Steptoe & Johnson
Maury Shenk, TMT Advisor at Steptoe and Johnson, working with a focus on intellectual property, information security and encryption issues, has agreed to be interviewed for the Security Thought Leadership project, Maury has also recently embarked on a consultancy business to build on new approaches for realizing value in technology and intellectual property He has agreed to be interviewed for the Security Thought Leadership project, and we certainly thank Maury for his time.
Chris Wysopal, CTO, Veracode
Veracodes CTO and Co-Founder, Chris Wysopal, was named one of InfoWorld's Top 25 CTO's and one of the 100 most influential people in IT by eWeek. One of the original vulnerability researchers and a member of L0pht Heavy Industries, he has testified on Capitol Hill in the US on the subjects of government computer security and how vulnerabilities are discovered in software. He is the author of The Art of Software Security Testing published by Addison-Wesley.
Amir Ben-Efraim, CEO, Altor Networks
Amir Ben-Efraim, CEO and co-founder of Altor Networks has agreed to be interviewed for the Security Thought Leadership project. His company's booth at RSA2009 piqued my interest because they deal with one of my favorite subjects, Defense-in-Depth, but specifically in the virtual environment.