-
Ed Skoudis is no longer answering questions for SearchSecurity.com.
Ed Skoudis is a founder and Senior Security Consultant with InGuardians, a Washington, DC-based information security consulting firm. His expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed information security governance and operations teams for Fortune 500 companies, and responded to computer attacks for clients in financial, high technology, health care, and other industries. Ed conducted a demonstration of hacker techniques against financial institutions for the U.S. Senate and is a frequent speaker on issues associated with hacker tools and defenses. In addition to Counter Hack Reloaded, Ed is also the author of Malware: Fighting Malicious Code. He was also awarded 2004, 2005, and 2006 Microsoft MVP awards for Windows Server Security, and is an alumnus of the Honeynet Project. Previous to Intelguardians, Ed served as a security consultant with International Network Services (INS), Predictive Systems, Global Integrity, SAIC, and Bell Communications Research (Bellcore).
-
Do you have a question for our experts?
Contributions from Ed Skoudis, past SearchSecurity.com expert
- Can rootkit detection mechanisms stop the Blue Pill?
- Is introducing Wi-Fi to airplanes is a good idea security-wise?
- Are there antivirus suites that pick up more than just run-of-the-mill viruses?
- Can a hacker actually post malicious scripts to any server using a drop-down list?
- What tools can a hacker use to crack a laptop password?
- Should organizations implement an incident severity ratings system?
- Are social networking sites an easy target for malicious hackers?
- What kind of data is compromised during a Google hack?
- Best practices for using restriction policy whitelists
- What are the dangers of cross-site request forgery attacks (CSRF)?
- Should social engineering tests be included in penetration testing?
- Defining mobile device security concerns
- What are the risks associated with RIM's line of PDAs?
- Is it possible to delete search data from a search engine's servers?
- Are there effective tools that can determine if Storm and Nugache Trojans have been installed?
- Can 'herd intelligence' effectively stop malware?
- What security measures can be taken to stop crimeware kits?
- Is there a market for standalone antivirus products?
- How should application developers manage cookies?
- What software development practices prevent input validation attacks?
Security Management Strategies for the CIO