![]() ![]() Development of first SIEM technology to combine threat and fraud management incorporating 12 types of data, including both network threat detection, DLP, system sources, web, and custom applications. Successful application penetration test on TecSec’s application privacy suite used by the NSA, including discovery of one way hash vulnerability that allowed compromise of primary privacy content by a non-user. And used in products such as IBM/ISS Real Secure today. Advanced pattern and regular expression development Over 400 IDS signature decodes Numerous data collection, translation, and analysis patterns for SIEM platforms. First to discover cryptographic flawin TFN2K while under defense commission during terrorist attacks on air traffic control towers. ![]() Provided updates to the community with example security architectures and sample code for enterprise systems. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |