Author

 David L. Axelrod and Terence M. Grugan
LinkedIn
RSS
E-Mail

Profile of David L. Axelrod and Terence M. Grugan

Partner, Ballard Spahr
Member Since: 10/5/2017
Author
News & Commentary Posts: 1
Comments: 0

David L. Axelrod, Partner, Ballard Spahr
Ballard Spahr partner David L. Axelrod is a former supervisory trial counsel at the U.S. Securities and Exchange Commission's (SEC) Philadelphia Regional Office. At the SEC, he directed all aspects of litigation, leading complex, multi-agency investigations into a range of alleged securities law violations, and serving as lead trial counsel in high-profile federal cases. At Ballard Spahr, Axelrod represents companies and individuals under investigation for alleged violations of state and federal law, including insider trading and market manipulation.

Terence M. Grugan, Associate, Ballard Spahr
Terence M. Grugan, an associate at Ballard Spahr, represents individuals and entities who are subjects of criminal, regulatory, or administrative government investigations, including investigations conducted by the Securities and Exchange Commission. Before joining Ballard Spahr, Grugan worked as a special investigator with the Philadelphia Office of the Inspector General, where he conducted criminal and administrative investigations into fraud and corruption in city government.

Articles by David L. Axelrod and Terence M. Grugan
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
What Israel's Elite Defense Force Unit 8200 Can Teach Security about Diversity
Lital Asher-Dotan, Senior Director, Security Research and Content, Cybereason,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The one you have not seen, won't be remembered".
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10653
PUBLISHED: 2018-05-23
There is an XML External Entity (XXE) Processing Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10654
PUBLISHED: 2018-05-23
There is a Hazelcast Library Java Deserialization Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10648
PUBLISHED: 2018-05-23
There are Unauthenticated File Upload Vulnerabilities in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10649
PUBLISHED: 2018-05-23
There is a Cross-Site Scripting Vulnerability in Citrix XenMobile Server 10.7 before RP3.
CVE-2018-10650
PUBLISHED: 2018-05-23
There is an Insufficient Path Validation Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.