Ed Skoudis is the founder of Counter Hack, an information security training organization, and a SANS fellow. He previously was founder and Senior Security Consultant with InGuardians, a Washington, DC-based information security consulting firm. His expertise includes information security attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed information security governance and operations teams for Fortune 500 companies, and responded to computer attacks for clients in financial, high technology, health care, and other industries. Ed conducted a demonstration of hacker techniques against financial institutions for the U.S. Senate and is a frequent speaker on issues associated with hacker tools and defenses. In addition to Counter Hack Reloaded, Ed is also the author of Malware: Fighting Malicious Code. He was also awarded 2004, 2005, and 2006 Microsoft MVP awards for Windows Server Security, and is an alumnus of the Honeynet Project. Previous to InGuardians, Ed served as a security consultant with International Network Services (INS), Predictive Systems, Global Integrity, SAIC, and Bell Communications Research (Bellcore).
Do you have a question for our experts?
Contributions from Ed Skoudis, Contributor
- Are there effective tools that can determine if Storm and Nugache Trojans have been installed?
- What software development practices prevent input validation attacks?
- Is there a market for standalone antivirus products?
- How should application developers manage cookies?
- Can 'herd intelligence' effectively stop malware?
- What security measures can be taken to stop crimeware kits?
- What is the safest way to handle quarantined adware?
- Enterprise security in 2008: Malware trends suggest new
- What security risks do enterprise honeypots pose?
- How effective are phishing links that refer to FTP sites?
- Does Teredo present security risks to the enterprise?
- Should a Java Runtime Environment (JRE) be kept up to date?
- Should keystroke loggers be used in enterprise investigations?
- Thinking fast-flux: New bait for advanced phishing tact
- Can threat modeling help enterprises?
- What is Spycar?
- How can copying file and exchanging memory tokens spread malware?
- Exploring enterprise policy management options
- iPhone security in the enterprise: Mitigating the risks
- Will Web browsers ever be fully equipped to detect and remove malware?