Profile for jeremy_wittkop

jeremy_wittkop
Member Since: April 27, 2018
Author
Blog Posts: 1
Posts: 3

Jeremy Wittkop is chief technology officer at Denver-based InteliSecure (http://www.intelisecure.com), where leads a frontline team that investigates and ensures the integrity and functionality of every custom solution designed for its clients. He evaluates new offerings for InteliSecure customers and develops solutions that address the new and ever-changing security risks to the enterprise.

Jeremy previously served as director of sales engineering at InteliSecure where he was responsible for building and leading the solution engineering team to support InteliSecure's robust portfolio of managed security services, consulting services, technical services and product solutions. Prior to joining InteliSecure, Jeremy served as a field service technician and maintenance mechanic team lead with General Dynamics. With experience in private industry and as a field service technician/armor crewmember with the U.S. Army, Jeremy brings a unique perspective to today's evolving security threats.

Jeremy is a published cybersecurity industry blogger, writing on issues specific to critical data protection, GDPR and Article 37 specific to the creation of a data protection officer, data loss prevention, Security Information and Event Management (SIEM), and Cloud Access Security Brokers (CASBs). He holds a Bachelor of Science in Information Technology from Colorado State University.



Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13100
PUBLISHED: 2018-08-15
DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13101
PUBLISHED: 2018-08-15
Musical.ly Inc., musical.ly - your video social network, 6.1.6, 2017-10-03, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.