Thought Leaders
Editors
Marilyn Cohodas
Marilyn Cohodas
Community Editor, Dark Reading
Kelly Jackson Higgins
Kelly Jackson Higgins
Executive Editor at Dark Reading
Sara Peters
Sara Peters
Senior Editor at Dark Reading
Tim Wilson
Tim Wilson
Editor in Chief, Dark Reading
Contributors
Hardik Modi
Hardik Modi
Director of Threat Research, Fidelis Cybersecurity
John Bambenek
John Bambenek
Senior Threat Researcher, Fidelis Cybersecurity
Ryan Vela
Ryan Vela
Regional Director, Fidelis Cybersecurity
Tsion Gonen
Tsion Gonen
Chief Strategy Office, Gemalto, Identity & Data Protection
Yoav Leitersdorf and Ofer Schreiber
Yoav Leitersdorf and Ofer Schreiber
Managing Partner & Partner, YL Ventures
James  Kane
James Kane - James Kane
Cofounder, Two Bulls
Paul   Shomo
Paul Shomo - Paul Shomo
Technical Manager Strategic Partnerships, Guidance Software
Rob  Tate
Rob Tate - Rob Tate
Senior Manager, WhiteHat Security, Threat Research Center
Fahmida  Y. Rashid
Fahmida Y. Rashid - Fahmida Y. Rashid
Contributing Editor, Dark Reading
Neil R. Wyler (Grifter)
Neil R. Wyler (Grifter)
Threat Hunting and Incident Response Specialist, RSA
Kurt  A. Mueffelmann
Kurt A. Mueffelmann - Kurt A. Mueffelmann
President & CEO, Cryptzone
Robert R. Ackerman Jr.
Robert R. Ackerman Jr.
Founder & Managing Director, Allegis Capital
Dave Aitel-McGeorge
Dave Aitel-McGeorge
CEO & Head of Threat Intelligence, Immunity Inc.
Jon  Allen
Jon Allen - Jon Allen
Assistant VP & CISO, Baylor University
Yoni Allon
Yoni Allon
Research Team Leader, LightCyber
Ryan Allphin
Ryan Allphin
Senior Vice President & General Manager, Security Management, McAfee
Dmitri Alperovitch
Dmitri Alperovitch
Co-Founder & CTO, CrowdStrike
Franois Amigorena
Franois Amigorena
Founder & CEO, IS Decisions
Ed Amoroso
Ed Amoroso
Chief Security Officer, AT&T
Kunal  Anand
Kunal Anand - Kunal Anand
co-founder and CTO, Prevoty
Jonathan Anderson
Jonathan Anderson
Chief Technology Officer of IoT Security, Intel Security
Bret Arsenault
Bret Arsenault
CISO, Microsoft
Liviu Arsene
Liviu Arsene
Senior E-threat Analyst, Bitdefender
Danelle Au
Danelle Au
VP Strategy, SafeBreach
Gasan Awad
Gasan Awad
VP, Identity & Fraud Product Management, Equifax
Charles Babcock
Charles Babcock
Editor at Large, Cloud
Don Bailey
Don Bailey
Founder & CEO, Lab Mouse Security
Vijay Basani
Vijay Basani
CEO, EiQ Networks
Avi Bashan
Avi Bashan
Senior Security Researcher, Check Point
Deborah Baxley
Deborah Baxley
Principal, Cards & Payments, Capgemini Financial Services
Christiaan Beek
Christiaan Beek
Threat Intelligence Research, Office of the CTO,Intel Security
Rohyt Belani
Rohyt Belani
CEO & Co-Founder, PhishMe
Julien Bellanger
Julien Bellanger
CEO & Cofounder, Prevoty
Anthony Di Bello
Anthony Di Bello
Director, Security Practice, Guidance Software
Vincent Berk
Vincent Berk
CEO, FlowTraq
David Berlind
Chief Content Officer, UBM TechWeb
Rajat Bhargava
Rajat Bhargava
Co-Founder & CEO, JumpCloud
Rishi  Bhargava
Rishi Bhargava - Rishi Bhargava
Vice President and General Manager of the Software Defined Datacenter Group at Intel Security.
David Bianco
David Bianco
Security Architect, Sqrrl
Michael Biddick
Michael Biddick
CEO, Fusion PPT
Bilton Bilton
Bilton Bilton
Luke Bilton, Director, Digital & Content, UBM
James Bindseil
James Bindseil
President & CEO, Globalscape
Kal Bittianda
Kal Bittianda
Consultant, Egon Zehnder
Boatner Blankenstein
Boatner Blankenstein
Senior Director, Solutions Engineering, Bomgar
Kevin Bocek
Kevin Bocek
VP Security Strategy & Threat Intelligence, Venafi
Ellis Booker
Ellis Booker
Technology Journalist
Kate Borten
Kate Borten
President, The Marblehead Group
Jennifer Bosavage
Jennifer Bosavage
Editor In Chief, Solution Providers for Retail
Bogdan Botezatu
Bogdan Botezatu
Senior E-threat Analyst, Bitdefender
Tom Bowers
Tom Bowers
Chief Security Strategist, ePlus Technologies
Stephen Boyer
Stephen Boyer
CTO & Founder, BitSight Technologies
Andre Boysen
Andre Boysen
EVP, Digital Identity Evangelist, SecureKey
Jonathan Braverman
Jonathan Braverman
Legal and Compliance Officer, Cymmetria
Jody Brazil
Jody Brazil
Founder and CEO of FireMon
Chris Bream
Chris Bream
Security Director, Facebook
Mark Bregman
Mark Bregman
Senior Vice President & Chief Technology Officer, Neustar
Bill Brenner
Bill Brenner
Information Security Blogger
John Bumgarner
John Bumgarner
Chief Technology Officer for the U.S. Cyber Consequences Unit
Nathan Burke
Nathan Burke
VP, Marketing, Hexadite
Kristin Burnham
Kristin Burnham
Senior Editor, InformationWeek.com
James C. Foster
James C. Foster
Founder & CEO, ZeroFOX
Doug Cahill
Doug Cahill
Senior Analyst, Enterprise Strategy Group
Pat  Calhoun
Pat Calhoun - Pat Calhoun
Senior Vice President & General Manager, Network Security at Intel Security
Cameron Camp
Cameron Camp
ESET Security Researcher
Torry  Campbell
Torry Campbell - Torry Campbell
Chief Technical Officer of Endpoint and Management at Intel Security
Craig Carpenter
Craig Carpenter
President & COO, Resolution1 Security
David F Carr
David F Carr
Editor, InformationWeek Government/Healthcare
Mark Carrizosa
Mark Carrizosa
VP of Security, Soha Systems
Pat Carroll
Pat Carroll
Executive Chairman & Founder, ValidSoft
Philip Casesa
Philip Casesa
CISSP, CSSLP, PMP, Product Development Strategist, (ISC)
Mo Cashman
Mo Cashman
Director of the Enterprise Architecture team at Intel Security.
Sol Cates
Sol Cates
CSO, Vormetric
Chris Chapman
Chris Chapman
Senior Methodologist, Spirent Communications
James Chappell
James Chappell
CTO & Founder, Digital Shadows
Anna Chiang
Anna Chiang
Technical Marketing Manager, Perforce Software
Ericka Chickowski
Ericka Chickowski
Contributing Writer, Dark Reading
Michele Chubirka
Michele Chubirka
Security Architect
Asaf Cidon
Asaf Cidon
CEO & Co-founder, Sookasa
Thomas Claburn
Thomas Claburn
Editor at Large, Enterprise Mobility
Mark Clancy
Mark Clancy
CEO, Soltra
Doug Clare
Doug Clare
Vice President of Product Management, FICO
Kerstyn Clover
Kerstyn Clover
Attack & Defense Team Consultant
Michael Coates
Michael Coates
Chairman, OWASP; Director, Product Security, Shape Security
Mark L. Cohn
Mark L. Cohn
Chief Technology Officer, Unisys Federal Systems
Eric Cole
Eric Cole
Founder & Chief Scientist, Secure Anchor Consulting
Leo Cole
Leo Cole
GM, Security Solutions, Trustwave
Andrew Conry-Murray
Andrew Conry-Murray
Director of Content & Community, Interop
Mike Convertino
Mike Convertino
CISO & VP, Information Security, F5 Networks
Matthew Cook
Matthew Cook
Co-founder, Panopticon Laboratories
Lance Cottrell
Lance Cottrell
Chief Scientist, Ntrepid
Bob Covello
Bob Covello
Security Tech Veteran
Bruce Cowper
Bruce Cowper
SecTor Co-Founder
Simon Crosby
Simon Crosby
Co-founder & CTO, Bromium
George Crump
George Crump
President, Storage Switzerland
Dan Cuddeford
Dan Cuddeford
Director of Sales Engineering, Wandera
Dr. Chase Cunningham
Dr. Chase Cunningham
Head of Threat Intelligence, Armor
Eric D. Knapp
Eric D. Knapp
Global Director of Cyber Security Solutions & Technology, Honeywell
Art Dahnert
Art Dahnert
Managing Consultant, Cigital, Inc.
Curtis Dalton
Curtis Dalton
SVP & Global Head of Security Services for Pactera US (a Blackstone portfolio company)
Michael K. Daly
Michael K. Daly
CTO, Cybersecurity & Special Missions, Raytheon Intelligence, Information & Services
Andy Daudelin
Andy Daudelin
VP Security Services, AT&T Business Solutions
Michael A. Davis
Michael A. Davis
Contributing Editor
Amy DeCarlo
Amy DeCarlo
Principal Analyst, Security and Data Center Services
Alison Diana
Alison Diana
Senior Editor
Boonsri Dickinson
Boonsri Dickinson
Associate Editor of BYTE
John Dickson
John Dickson
CISSP, Principal, Denim Group
Carric Dooley
Carric Dooley
WW VP of Foundstone Services, Intel Security
Paul Drapeau
Paul Drapeau
Principal Security Researcher, Confer
Lance Dubsky
Lance Dubsky
Chief Security Strategist, Americas, at FireEye
Andrey Dulkin
Andrey Dulkin
Senior Director, Cyber Innovation, CyberArk
Phil Dunkelberger
Phil Dunkelberger
President & CEO, Nok Nok Labs
Steve Durbin
Steve Durbin
Global VP, Information Security Forum
Brian Dye
Brian Dye
Corporate Vice President, Intel Security Group General Manager, Corporate Products
Adam Ely
Adam Ely
COO, Bluebox
Michael Endler
Michael Endler
Associate Editor, InformationWeek.com
Giora Engel
Giora Engel
VP Product & Strategy, LightCyber
Rami Essaid
Rami Essaid
CEO and co-founder, Distil Networks
Gadi Evron
Gadi Evron
CEO & Founder, Cymmetria, head of Israeli CERT, Chairman, Cyber Threat Intelligence Alliance
Marisa Fagan
Marisa Fagan
Community Manager, Bugcrowd
Todd Feinman
Todd Feinman
President & CEO, Identity Finder
Jonathan Feldman
Jonathan Feldman
CIO, City of Asheville, NC
Joe  Ferrara
Joe Ferrara - Joe Ferrara
President & CEO, Wombat Security Technologies
Greg Ferro
Greg Ferro
Network Architect & Blogger
Michael Fey
Michael Fey
President & COO, Blue Coat
Michael Finneran
Michael Finneran
President, dBrn Associates, Inc.
Adam Firestone
Adam Firestone
President & GM, Kaspersky Government Security Solutions
Thomas Fischer
Thomas Fischer
Principal Threat Researcher, Digital Guardian
Jamesha Fisher
Jamesha Fisher
DevOps Security Pirate
Roman Foeckl
Roman Foeckl
CEO & Founder, CoSoSys
Kevin Fogarty
Kevin Fogarty
Technology Writer
John Foley
John Foley
Editor, InformationWeek
Harry  Folloder
Harry Folloder - Harry Folloder
CIO, Advantage Waypoint LLC (AWP)
Francisco Fonseca
Francisco Fonseca
CEO & Co-founder of AnubisNetworks
Andrew Ford
Andrew Ford
Developer, Bugcrowd
Brian Foster
Brian Foster
CTO, Damballa
Eleonore Fournier-Tombs
Eleonore Fournier-Tombs
Field Data Scientist, RedOwl
Celeste Fralick
Celeste Fralick
Principal Engineer and CTO for Analytics, Intel Security
Paige Francis
Paige Francis
CIO for IT, Fairfield University
Dan Frank
Dan Frank
Deloitte Advisory Principal, Cyber Risk Services
Mari Frank
Mari Frank
Attorney & Privacy Expert
Mike Fratto
Mike Fratto
Former Network Computing Editor
Eric Friedberg
Eric Friedberg
Executive Chairman, Stroz Friedberg
Andrew Froehlich
Andrew Froehlich
President & Lead Network Architect, West Gate Networks
Dave Frymier
Dave Frymier
Chief Information Security Officer, Unisys
Sergio Galindo
Sergio Galindo
GM, GFI Software
Lorna Garey
Lorna Garey
Content Director, InformationWeek Reports
Brad Garlinghouse
Brad Garlinghouse
CEO, Hightail
Ted Gary
Ted Gary
Product Marketing Manager, Tenable
Randy George
Randy George
Director, IT Operations, Boston Red Sox
Alexandra Gheorghe
Alexandra Gheorghe
Security Specialist, Bitdefender
Simon Gibson
Simon Gibson
Fellow Security Architect, Gigamon
Brian Gillooly
Brian Gillooly
Vice President, Event Content & Strategy, UBM Tech
Andrew Ginter
Andrew Ginter
Vice President of Industrial Security, Waterfall Security Solutions
Itay Glick
Itay Glick
CEO & Co-founder, Votiro
Joshua Goldfarb
Joshua Goldfarb
VP & CTO - Emerging Technologies, FireEye
Rick Gordon
Rick Gordon
Managing Partner, Mach37 Cyber Accelerator
Doug Gourlay
Doug Gourlay
Corporate VP, Skyport Systems
Keith Graham
Keith Graham
CTO, SecureAuth
Garret Grajek
Garret Grajek
CTO & COO, SecureAuth
Kevin E. Greene
Kevin E. Greene
Cyber Security Thought Leader
Rob Greer
Rob Greer
CMO & Senior VP, Products, ForeScout
Lynda Grindstaff
Lynda Grindstaff
Senior Director of the Innovation Pipeline, Intel Security
Steve  Grobman
Steve Grobman - Steve Grobman
Chief Technology Officer at Intel Security
Levi Gundert
Levi Gundert
Vice President, Threat Intelligence, Recorded Future
Peter Gyongyosi
Peter Gyongyosi
Product Manager, Balabit
Morey Haber
Morey Haber
VP, Technology, BeyondTrust
Christopher Hadnagy
Christopher Hadnagy
Founder & CEO, Social-Engineer, Inc.
Steve Hall
Steve Hall
VP of Product Marketing, Tenable Network Security, Inc.
Bob Hansmann
Bob Hansmann
Director, Security Technologies, Forcepoint
Chris Harget
Chris Harget
Senior Product Marketing Manager, Trustwave
Malcolm Harkins
Malcolm Harkins
Chief Information Security Officer, Cylance Inc.
Malcolm Harkins
Malcolm Harkins
Vice President and Chief Security and Privacy Officer, Intel Corporation
Bil Harmer​
Bil Harmer​
Chief Security Officer, GoodData
Matt Hartley
Matt Hartley
VP Product Management, iSIGHT Partners
John C. Havens
John C. Havens
Founder, The H(app)athon Project, & IEEE Computer Society Rock Stars Speaker
Andrew Hay
Andrew Hay
CISO, DataGravity, Inc.
Tim Helming
Tim Helming
Director of Product Management, DomainTools
Doug Henschen
Doug Henschen
Executive Editor, Enterprise Apps
Carl Herberger
Carl Herberger
VP, Security Solutions, Radware
Joe Hernick
Joe Hernick
IT Director
Robert Hinden
Robert Hinden
Check Point Fellow & IPV6 Co-Inventor
Preston Hogue
Preston Hogue
Director of Security Marketing Architecture, F5 Networks
David Holmes
David Holmes
World-Wide Security Evangelist, F5
J. Nicholas Hoover
J. Nicholas Hoover
Senior Editor, InformationWeek Government
Mark Hoover
Mark Hoover
CEO, Vidder, Inc.
Kristi Horton
Kristi Horton
Lead Intelligence Officer, Financial Services Information Sharing and Analysis Center (FS-ISAC)
Rick Howard
Rick Howard
CSO, Palo Alto Networks
Emilio Iasiello
Emilio Iasiello
Senior Cyber Intelligence Analyst, Fidelis Cybersecurity
Daniel Ingevaldson
Daniel Ingevaldson
CTO, Easy Solutions
Ofer Israeli
Ofer Israeli
Founder & VP, R&D, illusive networks
Ravi Ithal
Ravi Ithal
Chief Architect, Netskope
Jennifer Jabbusch
Jennifer Jabbusch
VP of Engineering and consulting CISO at Carolina Advanced Digital
Ben Jackson
Ben Jackson
Risk & Fraud Officer, PromisePay
William Jackson
William Jackson
Technology Writer
Jay Jacobs
Jay Jacobs
Senior Data Scientist, BitSight Technologies
David Jacoby
David Jacoby
Sr. Security Researcher, Kaspersky Lab
Mike Jennett
Mike Jennett
Enterprise IT Mobility Program Director, HP
Barbara Johnson
Barbara Johnson
Senior Lead Certification Instructor & Courseware Developer, The Training Camp
Ben Johnson
Ben Johnson
Cofounder & Chief Security Strategist, Carbon Black
Ben Johnson
Ben Johnson
Chief Security Strategist, Bit9 + Carbon Black
Emily Johnson
Emily Johnson
Associate Editor, UBM Americas
Rees  Johnson
Rees Johnson - Rees Johnson
Sr. VP and GM the Content Security Business Unit, Intel Security
Dan Jones
Dan Jones
Mobile Editor
Sheila B. Jordan
Sheila B. Jordan
SVP & CIO, Symantec
Bob Kalka
Bob Kalka
VP, IBM Security
Rick  Kam
Rick Kam - Rick Kam
Rick Kam, President & Co-founder, ID Experts & Larry Ponemon, Chairman & Founder, Ponemon Institute
TK Keanini
TK Keanini
CTO, Lancope
Dave Kearns
Dave Kearns
Analyst, Kuppinger-Cole
Tom Kellermann
Tom Kellermann
Chief Cybersecurity Office, Trend Micro
Melia Kelley
Melia Kelley
Managing Consultant, UnitedLex
Brett Kelsey
Brett Kelsey
VP & Chief Technology Officer, Americas, Intel Security
Mark  Kennedy
Mark Kennedy - Mark Kennedy
Chair, IEEE Industry Connections Security Group, Chair, IEEE Malware Working Group
Limor Kessem
Limor Kessem
Sr. Cybersecurity Evangelist, IBM Security
Jonathan King
Jonathan King
Security Technologist and Intel Principal Engineer in the Intel Security Office of the CTO
Tal Klein
Tal Klein
VP Strategy, Lakeside Software.
Bill Kleyman
Bill Kleyman
VP of Strategy and Innovation
John Klossner
John Klossner
Cartoonist
Marianne Kolbasuk McGee
Marianne Kolbasuk McGee
Senior Writer, InformationWeek
Ilia Kolochenko
Ilia Kolochenko
CEO, High-Tech Bridge
Mohan Koo
Mohan Koo
CEO & Co-founder, Dtex Systems
Vadim Kotov
Vadim Kotov
Senior Security Researcher, Bromium
George Kurtz
George Kurtz
President & CEO, CrowdStrike
Paul Kurtz
Paul Kurtz
CEO & Cofounder, TruSTAR Technology
Aamir Lakhani
Aamir Lakhani
Senior Security Strategist & Hacker, Fortinet, FortiGuard Advanced Labs
Dave Larson
Dave Larson
CTO & VP, Product, Corero Network Security
Ray Le Maistre
Ray Le Maistre
Editor-in-chief
Felix Leder
Felix Leder
Senior Malware Researcher, Blue Coat Systems Norway
Bill Ledingham
Bill Ledingham
CTO & Executive VP of Engineering, Black Duck Software
Martin Lee
Martin Lee
Technical Lead, Threat Research, Analysis & Communications, Cisco
Natalie Lehr
Natalie Lehr
Co-Founder & VP Analytics, TSC Advantage
Robert Lemos
Robert Lemos
Technology Journalist
Ashley Leonard
Ashley Leonard
President & CEO, Verismic Software
Kon Leong
Kon Leong
CEO/Co-founder, ZL Technologies
Lev Lesokhin
Lev Lesokhin
Executive VP, Strategy, CAST
Yehuda Lindell
Yehuda Lindell
Co-founder & Chief Scientist, Dyadic Security
David Lindner
David Lindner
Global Practice Manager, Mobile Application Security Services, Aspect Security
Pete Lindstrom
Pete Lindstrom
Principal & VP Research, Spire Security
Ricky Link
Ricky Link
Managing Director, Coalfire Systems, Southwest Region
Becca Lipman
Becca Lipman
Senior Editor
Matt Little
Matt Little
VP Product Development, PKWARE
Cricket Liu
Cricket Liu
Executive VP & Senior Fellow, Infoblox
Vincent Liu
Vincent Liu
Partner, Bishop Fox
Eric Lundquist
Eric Lundquist
VP & Editorial Analyst for InformationWeek Business Technology Network
Anthony Lye
Anthony Lye
President & CEO Chief Executive Officer, HotSchedules
Calum MacLeod
Calum MacLeod
VP, EMEA, Lieberman Software
Heidi Maher
Heidi Maher
Executive Director, Compliance, Governance and Oversight Counsel (CGOC)
Marc Maiffret
Marc Maiffret
CTO, BeyondTrust
Elena Malykhina
Elena Malykhina
Technology Journalist
Jim Manico
Jim Manico
OWASP Global Board Member
Jim Manico
Jim Manico
OWASP Global Board Member
Kurt Marko
Kurt Marko
Contributing Editor
John Markott
John Markott
Director of Product Management, Carbon Black
Howard Marks
Howard Marks
Network Computing Blogger
Sean Martin
Sean Martin
CISSP | President, imsmartin
Raffael Marty
Raffael Marty
Founder & CEO, pixlcloud
Leonard T. Marzigliano
Leonard T. Marzigliano
CISSP-ISSMP, Information Assurance Architect, Defense Logistics Agency
Sean Mason
Sean Mason
VP, Incident Response, Resolution1 Security
Paul McDougall
Paul McDougall
Editor At Large, InformationWeek
Martin McKeay
Martin McKeay
Senior Security Advocate, Akamai
Laurianne McLaughlin
Laurianne McLaughlin
Editor-in-Chief, InformationWeek.com
Michael McMahon
Michael McMahon
Director, Cyber Strategy & Analysis, Innovative Analytics & Training, LLC
Michelle McNickle
Michelle McNickle
Associate Editor of InformationWeek Healthcare
Jasmine McTigue
Jasmine McTigue
Principal, McTigue Analytics
David Melnick
David Melnick
Founder & CEO, WebLife Balance
Peter Merkulov
Peter Merkulov
VP, Product Strategy & Technology Alliances
Adam Meyers
Adam Meyers
VP of Intelligence, CrowdStrike
Grayson Milbourne
Grayson Milbourne
Director, Security Intelligence, Webroot
Gavin  Millard
Gavin Millard - Gavin Millard
Technical Director, EMEA, Tenable Network Security
Charlie Miller
Charlie Miller
Senior Vice President, The Santa Fe Group
Ned Miller
Ned Miller
Intel Security, Chief Technology Strategist for Public Sector
Grant Moerschel
Grant Moerschel
Co-Founder, WaveGard
Frank Mong
Frank Mong
Senior VP, Product, Industry & Solutions Marketing, Palo Alto Networks
Scott  Montgomery
Scott Montgomery - Scott Montgomery
VP and CTO-Americas & Public Sector, Intel Security
Steve Morgan
Steve Morgan
Founder & CEO, Cybersecurity Ventures
Katie Moussouris
Katie Moussouris
Chief Policy Officer, HackerOne
John Moynihan
John Moynihan
President, Minuteman Governance
Srinivas Mukkamala
Srinivas Mukkamala
Co-founder & CEO, RiskSense
Ken Munro
Ken Munro
Partner & Founder, Pen Test Partners LLP
Chris Murphy
Chris Murphy
Editor, InformationWeek
Lysa Myers
Lysa Myers
Security Researcher, ESET
Corey Nachreiner
Corey Nachreiner
Chief Technology Officer, WatchGuard Technologies
Alon Nafta
Alon Nafta
Senior Security Researcher, SentinelOne
Kaushik Narayan
Kaushik Narayan
CTO, Skyhigh Networks
Kaushik Narayan
Kaushik Narayan
Co-Founder and CTO at Skyhigh Networks
Krishna Narayanaswamy
Krishna Narayanaswamy
Founder & Chief Scientist, Netskope
Wendy Nather
Wendy Nather
Research Director, Enterprise Security Practice
Saryu Nayyar
Saryu Nayyar
CEO, Gurucul
Bill Nelson
Bill Nelson
President & CEO, Financial Services Information Sharing and Analysis Center (FS-ISAC) and CEO, Soltra
Fritz Nelson
Fritz Nelson
Vice President, Editorial Director InformationWeek Business Technology Network
Stephen Newman
Stephen Newman
CTO, Damballa
Andy Nieto
Andy Nieto
IT Strategist, DataMotion
Fredrik Nilsson
Fredrik Nilsson
General Manager, Axis Communications, North America
Evelyn De Souza & Richard Noguera
Evelyn De Souza & Richard Noguera
Cloud Security Alliance Data Governance Chair & Cloud Compliance & Data Privacy Strategy Leader, Cisco
Dotan Noy
Dotan Noy
CEO & Co-Founder, ReSec Technologies
Susan Nunziata
Susan Nunziata
Editorial Director
Chris Nutt
Chris Nutt
Director, Incident Response & Malware, Mandiant
Gunter Ollmann
Gunter Ollmann
Chief Security Officer, Vectra
Joseph Opacki
Joseph Opacki
VP, Threat Research, PhishLabs
Rene Paap
Rene Paap
Product Marketing Manager, A10 Networks
Mark Papermaster
Mark Papermaster
SVP & CTO, AMD
Mike Paquette
Mike Paquette
VP Products, Prelert
Pritesh Parekh
Pritesh Parekh
VP & Chief Security Officer, Zuora
Dana Pasquali
Dana Pasquali
Cybersecurity Product Line Leader, GE Oil & Gas
Manish Patel
Manish Patel
Senior Product Marketing Manager, Tenable
Raja Patel
Raja Patel
Vice President and General Manager of Network Security at Intel Security
Theresa Payton
Theresa Payton
Former White House CIO, CEO of Fortalice Solutions, LLC
Thomas Pedersen
Thomas Pedersen
CEO & Founder, OneLogin
Tom Pendergast
Tom Pendergast
Chief Strategist, Security, Privacy, & Compliance, MediaPro
Barak Perelman
Barak Perelman
CEO, Indegy
Susan Peterson
Susan Peterson
Product Security Leader, GE Oil & Gas
Scott Petry
Scott Petry - Scott Petry
Co-Founder & CEO of Authentic8
John W. Pirc
John W. Pirc
Research Vice President, NSS Labs
Dave Piscitello
Dave Piscitello
VP Security, ICANN
Mike Pittenger
Mike Pittenger
Vice President, Product Strategy at Black Duck Software
Jason Polancich
Jason Polancich
Founder & Chief Architect, SurfWatchLabs
Malte Pollmann
Malte Pollmann
CEO, Utimaco
Larry Ponemon
Larry Ponemon
Chairman & Founder, Ponemon Institute
Tony Porras
Tony Porras
Cyber Security & Compliance Attorney
Nitin Pradhan
Nitin Pradhan
Managing Partner, GOVonomy
Rob Preston
Rob Preston
VP & Editor in Chief, InformationWeek
Kymberlee Price
Kymberlee Price
Senior Director of Researcher Operations, Bugcrowd
Brian Prince
Brian Prince
Contributing Writer, Dark Reading
Tom Quillin
Tom Quillin
Director of Cyber Security Technology & Initiatives, Intel Corporation
Rob Ragan
Rob Ragan
Senior Security Associate, Bishop Fox
Mike Raggo
Mike Raggo
Chief Research Scientist, ZeroFOX (CISSP, NSA-IAM, ACE, CSI)
Ranga Rajagopalan
Ranga Rajagopalan
Chief Technology Officer, Avi Networks
Kevin T. Reardon
Kevin T. Reardon
VP, Worldwide Strategy at Intel Security
Jim Reavis
Jim Reavis
Co-Founder & Executive Director, Cloud Security Alliance
Robert Reeves
Robert Reeves
CTO & Co-Founder, Datical
Ojas Rege
Ojas Rege
VP Strategy, MobileIron
Nimmy Reichenberg
Nimmy Reichenberg
VP of Strategy, AlgoSec
Gavin  Reid
Gavin Reid - Gavin Reid
Vice President, Threat Intelligence, Lancope Inc
Thibault Reuille
Thibault Reuille
Security Researcher, OpenDNS
Brian Riley
Brian Riley
Technical Director, Government Programs, Green Hills Software
Steve Riley
Steve Riley
Technical Leader, Office of the CTO, Riverbed Technology
Thomas Ristenpart
Thomas Ristenpart
Asst. Professor, Computer Sciences, University of Wisconsin
Uri Rivner
Uri Rivner
Co-Founder, Head of Cyber Strategy, BioCatch
Cam Roberson
Cam Roberson
Director Reseller Channel, Beachhead Solutions
Bradon Rogers
Bradon Rogers
Senior Vice President, Worldwide Product and Solution Marketing, Intel Security
Tim Rohrbaugh
Tim Rohrbaugh
VP Information Security, Intersections Inc.
Dan Ross
Dan Ross
CEO & President, Promisec
John Rostern
John Rostern
CRISC, QSA, VP Technology Audit & Advisory Services, Coalfire
Mike Rothman
Mike Rothman
Analyst & President, Securosis
Chris Rouland
Chris Rouland
Founder & CEO, Bastille
Jeff Rubin
Jeff Rubin
Co-Founder & VP, Beachhead Solutions
Jason Sachowski
Jason Sachowski
Director, Security Forensics & Civil Investigations, Scotiabank Group
Nitsan Saddan
Nitsan Saddan
Advanced Threat Researcher, Cymmetria
Raj  Samani
Raj Samani - Raj Samani
Chief Technology Officer of Intel Securitys Europe, Middle East and Africa division
Nick Sanna
Nick Sanna
President, Digital Risk Management Institute
Tim Sapio
Tim Sapio
Security Analyst, Bishop Fox
Sekhar Sarukkai
Sekhar Sarukkai
Co-founder & VP, Engineering, Skyhigh Networks
Marcia Savage
Marcia Savage
Managing Editor, Network Computing
John H. Sawyer
John H. Sawyer
Contributing Writer, Dark Reading
Ira Scharf
Ira Scharf
Chief Strategy Officer, BitSight Technologies
Jeff Schilling
Jeff Schilling
Chief of Operations and Security, Armor
Peter  Schlampp
Peter Schlampp - Peter Schlampp
VP of Products, Platfora
Jeff Schmidt
Jeff Schmidt
Founder & CEO of JAS Global Advisors LLC
Jason Schmitt
Jason Schmitt
VP & General Manager, Fortify, HP Enterprise Security Products
Joe Schorr
Joe Schorr
Director of Advanced Security Solutions, Bomgar
Jaeson Schultz
Jaeson Schultz
Threat Research Engineer, Cisco TRAC Team
Nick Selby
Nick Selby
CEO, StreetCred Software, Inc
Michael Sentonas
Michael Sentonas
Chief Technology and Strategy Officer, APAC
Udi  Shamir
Udi Shamir - Udi Shamir
Chief Security Officer, SentinelOne
Greg Shannon
Greg Shannon
Ph.D., chair, IEEE Cybersecurity Initiative & Chief Scientist, CERT Division, Carnegie Mellon University Software Engineering Institute
Jackson Shaw
Jackson Shaw
Senior Director, Product Management, Dell Security
Kelly Sheridan
Kelly Sheridan
Associate Editor, InformationWeek
JD Sherry
JD Sherry
VP Technology & Solutions, Trend Micro
Adam Shostack
Adam Shostack
Founder, Stealth Startup
Bryan Simon
Bryan Simon
CISSP, SANS Certified Instructor, President & CEO of Xploit Security Inc.
Yoran Sirkis
Yoran Sirkis
Chief Executive Officer, Covertix
Craig Smith
Craig Smith
CEO, Theia Labs
Kevin Smith
Kevin Smith
VP, The Graham Company
Phil Smith
Phil Smith
SVP Security Solutions, Trustwave
Stu  Solomon
Stu Solomon - Stu Solomon
VP, General Counsel & Chief Risk Officer, iSIGHT Partners
Dug Song
Dug Song
CEO, Duo Security
Haiyan Song
Haiyan Song
SVP Security Markets, Splunk
Mark Goldstein & Arun Sood
Mark Goldstein & Arun Sood
Principal, SafeSecurePrivate / PhD, Founder & CEO, SCIT Labs
David Spark
David Spark
Veteran Tech journalist and founder of Spark Media Solutions
Bob G. Stasio
Bob G. Stasio
Senior Product Manager, Cyber Analysis, IBM
Subbu  Sthanu
Subbu Sthanu - Subbu Sthanu
Director, Mobile Security & Application Security, IBM
Jason Straight
Jason Straight
Senior VP & Chief Privacy Officer, UnitedLex
John Strand
John Strand
SANS Senior Instructor & Owner, Black Hills Information Security
Troy Leach and Christopher Strand
Troy Leach and Christopher Strand
Chief Technology Officer, PCI Security Standards Council & Senior Director of Compliance, Bit9
Emma Sutcliffe
Emma Sutcliffe
Senior Director, Data Security Standards, PCI Security Standards Council
Michael Sutton
Michael Sutton
Chief Information Security Office, Zscaler
Terry Sweeney
Terry Sweeney
Contributing Editor
Shahar Tal
Shahar Tal
Vulnerability & Security Research Manager, Check Point Software Technologies
Oliver Tavakoli
Oliver Tavakoli
CTO, Vectra Networks, Inc.
Bankim Tejani
Bankim Tejani
Senior Security Architect, ServiceMesh
Idan Tendler
Idan Tendler
CEO, Fortscale
Todd Thibodeaux
Todd Thibodeaux
President & CEO, CompTIA
Patrick Thomas
Patrick Thomas
Senior Security Consultant, Cisco Security Solutions
J.J. Thompson
J.J. Thompson
CEO & Managing Director, Rook Security
Andrew Thomson
Andrew Thomson
CEO & Founder, VentureRadar
Josh Thurston
Josh Thurston
Security Strategist - Americas, Office of the CTO, Intel Security
Mike Tierney
Mike Tierney
COO, SpectorSoft
Jamie Tischart
Jamie Tischart
CTO, Cloud & SaaS Technologies, Intel Security
Fred Touchette
Fred Touchette
Manager of Security Research
Stephen Treglia
Stephen Treglia
JD, HCISPP, Legal Counsel & HIPAA Compliance Officer- Investigations, Absolute Software
Jay  Trinckes
Jay Trinckes - Jay Trinckes
Senior Practice Lead, Healthcare & Life Sciences, Coalfire
John Trobough
John Trobough
CEO, Narus
Ryan Trost
Ryan Trost
CIO & Co-founder, ThreatQuotient
Peleus Uhley
Peleus Uhley
Lead Security Strategist, Adobe
Alan Usas
Alan Usas
Adjunct Professor, Department of Computer Science, Brown University
Daniel  Velez
Daniel Velez - Daniel Velez
Insider Threat Operations, Raytheon Cyber Products
Chris Veltsos
Chris Veltsos
Associate Professor, Minnesota State University, Mankato
David Venable
David Venable
Director, Professional Services, Masergy Communications
Bala Venkat
Bala Venkat
CMO, Cenzic
Jai Vijayan
Jai Vijayan
Freelance writer
Paul Vixie
Paul Vixie
Chairman & CEO, Farsight Security, Inc.
Sarah Vonnegut
Sarah Vonnegut
Application Security Community Specialist, Checkmarx
Mitch Wagner
Mitch Wagner
California Bureau Chief, Light Reading
Julian Waits
Julian Waits
President & CEO, ThreatTrack Security
Mike Walls
Mike Walls
Managing Director Security Operations & Analysis, EdgeWave
Jim Walter
Jim Walter
Senior SPEAR Researcher, Cylance
Peter Waterhouse
Peter Waterhouse
Senior Technical Marketing Advisor, CA Technologies
Kevin Watson
Kevin Watson
CEO, VendorSafe
Vincent Weafer
Vincent Weafer
Senior Vice President, Intel Security
Scott Weber
Scott Weber
Managing Director, Stroz Friedberg
Derek Weeks
Derek Weeks
Vice President & DevOps Advocate, Sonatype
Mark Weinstein
Mark Weinstein
CEO, MeWe.com
Chris Weltzien
Chris Weltzien
CEO, 6Scan
Bob West
Bob West
Chief Trust Officer, CipherCloud
Kevin West
Kevin West
CEO & founder, K logix
Kennet Westby
Kennet Westby
Founding Partner, President & COO, Coalfire
Brian White
Brian White
Chief Operating Officer, RedOwl
Wendi Whitmore
Wendi Whitmore
Vice President, CrowdStrike Services
Kyle Wickert
Kyle Wickert
Lead Solution Architect, Product & Deployment, AlgoSec
Lorie Wigle
Lorie Wigle
Vice President, General Manager IOT Security Solutions, Intel Security Group
Amrit Williams
Amrit Williams
CTO, CloudPassage
Jeff Williams
Jeff Williams
CTO, Contrast Security
Ira Winkler
Ira Winkler
Co-Founder & President, Secure Mentem, Inc.
Chet Wisniewski
Chet Wisniewski
Senior Security Analyst, Sophos
Timber Wolfe
Timber Wolfe
Principal Security Engineer, TrainACE
Marc Woolward
Marc Woolward
CTO, vArmour
Candace Worley
Candace Worley
SVP & GM, Endpoint Security, McAfee
Candace Worley
Candace Worley
SVP & GM, Endpoint Security Business, Intel Security
Chris Wysopal
Chris Wysopal
CTO, CISO and co-founder, Veracode
Dr. Aleksandr Yampolskiy
Dr. Aleksandr Yampolskiy
CEO & Cofounder, SecurityScorecard
Nate Lesser & Mary Yang
Nate Lesser & Mary Yang
National Institute of Standards and Technology
Rutrell  Yasin
Rutrell Yasin - Rutrell Yasin
Business Technology Writer, Tech Writers Bureau
Rutrell Yasin
Rutrell Yasin
Freelance Writer
Ting-Fang Yen
Ting-Fang Yen
Research Scientist, DataVisor, Inc.
Amit Yoran
Amit Yoran
President, RSA
Lucas Zaichkowsky
Lucas Zaichkowsky
Enterprise Defense Architect, AccessData
Ron Zalkind
Ron Zalkind
CTO & Co-founder, CloudLock
Peter Zavlaris
Peter Zavlaris
Analyst, RiskIQ
Gustavo Zeidan
Gustavo Zeidan
Chief Technology Officer, Vijilan Security
Steve Zurier
Steve Zurier
Freelance Writer
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas and her guest, David Shearer, (ISC)2 Chief Executive Officer, as they discuss issues that keep IT security professionals up at night, including results from the recent 2016 Black Hat Attendee Survey.