Author

 Nate Lesser & Mary Yang
Facebook
Twitter
LinkedIn
Google+
RSS
E-Mail

Profile of Nate Lesser & Mary Yang

National Institute of Standards and Technology
News & Commentary Posts: 1

Nate Lesser, Deputy Director, National Cybersecurity Center of Excellence, NIST
Nate Lesser is the deputy director of the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology. The NCCoE collaborates with members of industry, government, and academia to build open, standards-based, modular and practical example reference designs that address cybersecurity challenges in key economic sectors. Since assuming his role in December 2012, Nate has been the center's principal liaison to collaborators, cultivating relationships with leading technology companies, public and private sector executives, and national experts. He also oversees the center's collaborative engineering initiatives, which engage with communities of interest to explore and address intractable cybersecurity issues both within and across industry sectors. Nate previously managed a team of cybersecurity engineers at Booz Allen Hamilton and held a position as a Presidential Management Fellow with the Office of Management and Budget. Nate holds bachelor's and master's degrees in electrical engineering from Columbia University.

Mary Yang, NIST
Mary Yang is the communications and events strategist supporting the national cybersecurity federally funded research and development center at NIST. She has over a decade of experience developing best practices, white papers, case studies, and other content for technology companies of all sizes, from start-ups to publicly traded organizations. She also helps executives, technologists, and engineers translate their brilliant thoughts into compelling and engaging content, and she has been referred to as a "word ninja" by colleagues. Mary holds bachelor's and master's degrees in English Literature from Mount Holyoke College and the University of Sussex.

Articles by Nate Lesser & Mary Yang

Time to Focus on Data Integrity

6/17/2015
Information security efforts have historically centered on data theft. But cybercriminals who alter corporate records and personal information can also cause serious harm.

Post a Comment
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17321
PUBLISHED: 2018-09-22
An issue was discovered in SeaCMS 6.64. XSS exists in admin_datarelate.php via the time or maxHit parameter in a dorandomset action.
CVE-2018-17322
PUBLISHED: 2018-09-22
Cross-site scripting (XSS) vulnerability in index.php/index/category/index in YUNUCMS 1.1.4 allows remote attackers to inject arbitrary web script or HTML via the area parameter.
CVE-2018-14889
PUBLISHED: 2018-09-21
CouchDB in Vectra Networks Cognito Brain and Sensor before 4.3 contains a local code execution vulnerability.
CVE-2018-14890
PUBLISHED: 2018-09-21
Vectra Networks Cognito Brain and Sensor before 4.2 contains a cross-site scripting (XSS) vulnerability in the Web Management Console.
CVE-2018-14891
PUBLISHED: 2018-09-21
Management Console in Vectra Networks Cognito Brain and Sensor before 4.3 contains a local privilege escalation vulnerability.